Provably Secure Role-Based Encryption with Revocation Mechanism

被引:17
|
作者
Zhu, Yan [1 ,2 ]
Hu, Hong-Xin [3 ]
Ahn, Gail-Joon [3 ]
Wang, Huai-Xi [4 ]
Wang, Shan-Biao [4 ]
机构
[1] Peking Univ, Inst Comp Sci Technol, Beijing 100871, Peoples R China
[2] Peking Univ, Beijing Key Lab Internet Secur Technol, Beijing 100871, Peoples R China
[3] Arizona State Univ, Sch Comp Informat & Decis Syst Engn, Tempe, AZ 85287 USA
[4] Peking Univ, Sch Math Sci, Beijing 100871, Peoples R China
基金
美国国家科学基金会;
关键词
cryptography; role-based encryption; role hierarchy; key hierarchy; collusion security; revocation; ACCESS-CONTROL; CIPHERTEXT;
D O I
10.1007/s11390-011-1169-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hierarchical RBAC model. In this paper, we present a practical RBE scheme with revocation mechanism based on partial-order key hierarchy with respect to the public key infrastructure, in which each user is assigned with a unique private-key to support user identification, and each role corresponds to a public group-key that is used to encrypt data. Based on this key hierarchy structure, our RBE scheme allows a sender to directly specify a role for encrypting data, which can be decrypted by all senior roles, as well as to revoke any subgroup of users and roles. We give a full proof of security of our scheme against hierarchical collusion attacks. In contrast to the existing solutions for encrypted file systems, our scheme not only supports dynamic joining and revoking users, but also has shorter ciphertexts and constant-size decryption keys.
引用
收藏
页码:697 / 710
页数:14
相关论文
共 50 条
  • [1] Provably Secure Role-Based Encryption with Revocation Mechanism
    Yan Zhu
    Hong-Xin Hu
    Gail-Joon Ahn
    Huai-Xi Wang
    Shan-Biao Wang
    [J]. Journal of Computer Science and Technology, 2011, 26 : 697 - 710
  • [2] Provably Secure Role-Based Encryption with Revocation Mechanism
    朱岩
    胡宏新
    Gail-Joon Ahn
    王怀习
    王善标
    [J]. Journal of Computer Science & Technology, 2011, (04) : 697 - 710
  • [3] Provably Secure Role-Based Encryption with Revocation Mechanism
    朱岩
    胡宏新
    GailJoon Ahn
    王怀习
    王善标
    [J]. Journal of Computer Science & Technology., 2011, 26 (04) - 710
  • [4] Robust and Provably Secure Attribute-Based Encryption Supporting Access Revocation and Outsourced Decryption
    Bkakria, Anis
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXVI, DBSEC 2022, 2022, 13383 : 197 - 214
  • [5] Practical and provably secure attribute based encryption
    Wong, Duncan S.
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8782
  • [6] Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating
    Naruse, Takeru
    Mohri, Masami
    Shiraishi, Yoshiaki
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2015, 5
  • [7] A Survey of Provably Secure Searchable Encryption
    Bosch, Christoph
    Hartel, Pieter
    Jonker, Willem
    Peter, Andreas
    [J]. ACM COMPUTING SURVEYS, 2015, 47 (02)
  • [8] A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption
    Wu, Wei
    Mu, Yi
    Susilo, Willy
    Huang, Xinyi
    Xu, Li
    [J]. COMPUTER JOURNAL, 2012, 55 (10): : 1157 - 1168
  • [9] Provably secure certificate-based encryption with leakage resilience
    Guo, Yuyan
    Li, Jiguo
    Lu, Yang
    Zhang, Yichen
    Zhang, Futai
    [J]. THEORETICAL COMPUTER SCIENCE, 2018, 711 : 1 - 10
  • [10] Generic constructions for role-based encryption
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (05) : 417 - 430