Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation

被引:61
|
作者
Xu, Shengmin [1 ]
Yang, Guomin [1 ]
Mu, Yi [2 ]
机构
[1] Univ Wollongong, Inst Cybersecur & Cryptol, Sch Comp & Informat Technol, Wollongong, NSW, Australia
[2] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Fujian, Peoples R China
基金
中国国家自然科学基金;
关键词
Access control; Attribute-based encryption; Revocable storage; Ecryption key exposure; REVOCATION;
D O I
10.1016/j.ins.2018.11.031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) enables fine-grained access control over encrypted data. A practical and popular approach for handing revocation in ABE is to use the indirect revocation mechanism, in which a key generation centre (KGC) periodically broadcasts key update information for all data users over a public channel. Unfortunately, existing RABE schemes are vulnerable to decryption key exposure attack which has been well studied in the identity-based setting. In this paper, we introduce a new notion for RABE called re-randomizable piecewise key generation by allowing a data user to re-randmomize the combined secret key and the key update to obtain the decryption key, and the secret key is unrecoverable even both the decryption key and the key update are known by the attacker. We then propose a new primitive called re-randomizable attribute-based encryption (RRABE) that can achieve both re-randomizable piecewise key generation and cipher text delegation. We also refine the existing security model for RABE to capture decryption key exposure resistance and present a generic construction of RABE from RRABE. Finally, by applying our generic transformation, we give a concrete RABE scheme achieving decryption key exposure resistance and ciphertext delegation simultaneously. (C) 2018 Elsevier Inc. All rights reserved.
引用
收藏
页码:116 / 134
页数:19
相关论文
共 50 条
  • [21] Traceable-then-revocable ciphertext-policy attribute-based encryption scheme
    Liu, Zhenhua
    Duan, Shuhong
    Zhou, Peilin
    Wang, Baocang
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 903 - 913
  • [22] A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption
    Malluhi, Qutaibah M.
    Shikfa, Abdullatif
    Viet Cuong Trinh
    [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 230 - 240
  • [23] A Boolean circuit-based revocable ciphertext policy attribute-based encryption scheme
    Ma, Chao
    Gao, Haiying
    Hu, Bin
    [J]. JOURNAL OF SUPERCOMPUTING, 2024, 80 (08): : 11762 - 11797
  • [24] A Boolean circuit-based revocable ciphertext policy attribute-based encryption scheme
    Chao Ma
    Haiying Gao
    Bin Hu
    [J]. The Journal of Supercomputing, 2024, 80 : 11762 - 11797
  • [25] Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption
    Rao, Y. Sreenivasa
    Dutta, Ratna
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2013, 2013, 8099 : 66 - 81
  • [26] Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing
    Jiang, Yinhao
    Susilo, Willy
    Mu, Yi
    Guo, Fuchun
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 720 - 729
  • [27] Traceable attribute-based encryption scheme with key-delegation abuse resistance
    Yan, Xixi
    He, Xu
    Liu, Tao
    Ye, Qing
    Yu, Jinxia
    Tang, Yongli
    [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (04): : 150 - 161
  • [28] Revocable and Decentralized Attribute-Based Encryption
    Cui, Hui
    Deng, Robert H.
    [J]. COMPUTER JOURNAL, 2016, 59 (08): : 1220 - 1235
  • [29] Robust, revocable, forward and backward adaptively secure attribute-based encryption with outsourced decryption
    Bkakria, Anis
    [J]. JOURNAL OF COMPUTER SECURITY, 2023, 31 (06) : 727 - 760
  • [30] A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection
    Han, Dezhi
    Pan, Nannan
    Li, Kuan-Ching
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 316 - 327