Provably Secure Role-Based Encryption with Revocation Mechanism

被引:17
|
作者
Zhu, Yan [1 ,2 ]
Hu, Hong-Xin [3 ]
Ahn, Gail-Joon [3 ]
Wang, Huai-Xi [4 ]
Wang, Shan-Biao [4 ]
机构
[1] Peking Univ, Inst Comp Sci Technol, Beijing 100871, Peoples R China
[2] Peking Univ, Beijing Key Lab Internet Secur Technol, Beijing 100871, Peoples R China
[3] Arizona State Univ, Sch Comp Informat & Decis Syst Engn, Tempe, AZ 85287 USA
[4] Peking Univ, Sch Math Sci, Beijing 100871, Peoples R China
基金
美国国家科学基金会;
关键词
cryptography; role-based encryption; role hierarchy; key hierarchy; collusion security; revocation; ACCESS-CONTROL; CIPHERTEXT;
D O I
10.1007/s11390-011-1169-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hierarchical RBAC model. In this paper, we present a practical RBE scheme with revocation mechanism based on partial-order key hierarchy with respect to the public key infrastructure, in which each user is assigned with a unique private-key to support user identification, and each role corresponds to a public group-key that is used to encrypt data. Based on this key hierarchy structure, our RBE scheme allows a sender to directly specify a role for encrypting data, which can be decrypted by all senior roles, as well as to revoke any subgroup of users and roles. We give a full proof of security of our scheme against hierarchical collusion attacks. In contrast to the existing solutions for encrypted file systems, our scheme not only supports dynamic joining and revoking users, but also has shorter ciphertexts and constant-size decryption keys.
引用
收藏
页码:697 / 710
页数:14
相关论文
共 50 条
  • [31] Towards provably secure asymmetric image encryption schemes
    Azam, Naveed Ahmed
    Zhu, Jianshen
    Hayat, Umar
    Shurbevski, Aleksandar
    [J]. INFORMATION SCIENCES, 2023, 631 : 164 - 184
  • [32] An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption
    Balu, A.
    Kuppusamy, K.
    [J]. INFORMATION SCIENCES, 2014, 276 : 354 - 362
  • [33] Efficient and provably secure attribute-based online/offline encryption schemes
    [J]. Ma, Hai-Ying, 1600, Editorial Board of Journal on Communications (35):
  • [34] Provably Secure Identity-Based Encryption and Signature over Cyclotomic Fields
    Wang, Yang
    Wang, Mingqiang
    Zou, Jingdan
    Xu, Jin
    Wang, Jing
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [35] Provably Secure Public Key Authenticated Encryption with Keyword Search Based on SGX
    Liu Y.
    Qin G.
    Liu P.
    Hu C.
    Guo S.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (12): : 2709 - 2724
  • [36] Threshold Homomorphic Encryption From Provably Secure NTRU
    Xu, Kexin
    Hong Meng Tan, Benjamin
    Wang, Li-Ping
    Mi Mi Aung, Khin
    Wang, Huaxiong
    [J]. COMPUTER JOURNAL, 2023, 66 (12): : 2861 - 2873
  • [37] Role-Based Architecture for Secure Management of Telepathology Sessions
    Jesus, Rui
    Nunes, Pedro
    Lebre, Rui
    Costa, Carlos
    [J]. DIGITAL PERSONALIZED HEALTH AND MEDICINE, 2020, 270 : 663 - 667
  • [38] Secure information sharing using role-based delegation
    Ahn, GJ
    Mohan, B
    [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 810 - 815
  • [39] Provably secure multi-proxy signature scheme with revocation in the standard model
    Liu, Zhenhua
    Hu, Yupu
    Zhang, Xiangsong
    Ma, Hua
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 494 - 501
  • [40] WEAKNESS OF PROVABLY SECURE SEARCHABLE ENCRYPTION AGAINST FREQUENCY ANALYSIS
    Suga, Takanori
    Nishide, Takashi
    Sakurai, Kouichi
    [J]. 2012 MOSHARAKA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, COMPUTERS AND APPLICATIONS (MIC-CCA), 2012, : 142 - 147