Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation

被引:61
|
作者
Xu, Shengmin [1 ]
Yang, Guomin [1 ]
Mu, Yi [2 ]
机构
[1] Univ Wollongong, Inst Cybersecur & Cryptol, Sch Comp & Informat Technol, Wollongong, NSW, Australia
[2] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Fujian, Peoples R China
基金
中国国家自然科学基金;
关键词
Access control; Attribute-based encryption; Revocable storage; Ecryption key exposure; REVOCATION;
D O I
10.1016/j.ins.2018.11.031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) enables fine-grained access control over encrypted data. A practical and popular approach for handing revocation in ABE is to use the indirect revocation mechanism, in which a key generation centre (KGC) periodically broadcasts key update information for all data users over a public channel. Unfortunately, existing RABE schemes are vulnerable to decryption key exposure attack which has been well studied in the identity-based setting. In this paper, we introduce a new notion for RABE called re-randomizable piecewise key generation by allowing a data user to re-randmomize the combined secret key and the key update to obtain the decryption key, and the secret key is unrecoverable even both the decryption key and the key update are known by the attacker. We then propose a new primitive called re-randomizable attribute-based encryption (RRABE) that can achieve both re-randomizable piecewise key generation and cipher text delegation. We also refine the existing security model for RABE to capture decryption key exposure resistance and present a generic construction of RABE from RRABE. Finally, by applying our generic transformation, we give a concrete RABE scheme achieving decryption key exposure resistance and ciphertext delegation simultaneously. (C) 2018 Elsevier Inc. All rights reserved.
引用
收藏
页码:116 / 134
页数:19
相关论文
共 50 条
  • [1] Lattice-based revocable attribute-based encryption with decryption key exposure resistance
    Dong, Xingting
    Hu, Yupu
    Wang, Baocang
    Liu, Momeng
    Gao, Wen
    [J]. IET INFORMATION SECURITY, 2021, 15 (06) : 428 - 441
  • [2] Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
    Shi, Yanfeng
    Zheng, Qingji
    Liu, Jigiang
    Han, Zhen
    [J]. INFORMATION SCIENCES, 2015, 295 : 221 - 231
  • [3] (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance
    Qin, Baodong
    Zhao, Qinglan
    Zheng, Dong
    Cui, Hui
    [J]. INFORMATION SCIENCES, 2019, 490 : 74 - 92
  • [4] Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure
    Qin, Baodong
    Zhao, Qinglan
    Zheng, Dong
    Cui, Hui
    [J]. CRYPTOLOGY AND NETWORK SECURITY (CANS 2017), 2018, 11261 : 504 - 514
  • [5] Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance
    Jiang, Yinhao
    Susilo, Willy
    Mu, Yi
    Guo, Fuchun
    [J]. INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 477 - 494
  • [6] Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
    Sahai, Amit
    Seyalioglu, Hakan
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 199 - 217
  • [7] Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation
    Yu, Gang
    Ma, Xiaoxiao
    Cao, Zhenfu
    Zhu, Weihua
    Zeng, Guang
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 172 - 179
  • [8] Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption
    Zuo, Cong
    Shao, Jun
    Wei, Guiyi
    Xie, Mande
    Ji, Min
    [J]. INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 495 - 508
  • [9] Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing
    Boxue Huang
    Juntao Gao
    Xuelian Li
    [J]. Journal of Cloud Computing, 12
  • [10] Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing
    Huang, Boxue
    Gao, Juntao
    Li, Xuelian
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):