Provably Secure Role-Based Encryption with Revocation Mechanism

被引:17
|
作者
Zhu, Yan [1 ,2 ]
Hu, Hong-Xin [3 ]
Ahn, Gail-Joon [3 ]
Wang, Huai-Xi [4 ]
Wang, Shan-Biao [4 ]
机构
[1] Peking Univ, Inst Comp Sci Technol, Beijing 100871, Peoples R China
[2] Peking Univ, Beijing Key Lab Internet Secur Technol, Beijing 100871, Peoples R China
[3] Arizona State Univ, Sch Comp Informat & Decis Syst Engn, Tempe, AZ 85287 USA
[4] Peking Univ, Sch Math Sci, Beijing 100871, Peoples R China
基金
美国国家科学基金会;
关键词
cryptography; role-based encryption; role hierarchy; key hierarchy; collusion security; revocation; ACCESS-CONTROL; CIPHERTEXT;
D O I
10.1007/s11390-011-1169-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hierarchical RBAC model. In this paper, we present a practical RBE scheme with revocation mechanism based on partial-order key hierarchy with respect to the public key infrastructure, in which each user is assigned with a unique private-key to support user identification, and each role corresponds to a public group-key that is used to encrypt data. Based on this key hierarchy structure, our RBE scheme allows a sender to directly specify a role for encrypting data, which can be decrypted by all senior roles, as well as to revoke any subgroup of users and roles. We give a full proof of security of our scheme against hierarchical collusion attacks. In contrast to the existing solutions for encrypted file systems, our scheme not only supports dynamic joining and revoking users, but also has shorter ciphertexts and constant-size decryption keys.
引用
收藏
页码:697 / 710
页数:14
相关论文
共 50 条
  • [41] Towards Provably Secure Encrypted Control Using Homomorphic Encryption
    Teranishi, Kaoru
    Kogiso, Kiminao
    [J]. 2022 IEEE 61ST CONFERENCE ON DECISION AND CONTROL (CDC), 2022, : 7740 - 7745
  • [42] A provably secure certificateless public key encryption with keyword search
    Wu, Tsu-Yang
    Chen, Chien-Ming
    Wang, King-Hang
    Meng, Chao
    Wang, Eric Ke
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2019, 42 (01) : 20 - 28
  • [43] Provably secure timed-release public key encryption
    Cheon, Jung Hee
    Hopper, Nicholas
    Kim, Yongdae
    Osipkov, Ivan
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (02)
  • [44] Provably secure and efficient escrowable public key encryption schemes
    Liu, Wen-Hao
    Wang, Sheng-Bao
    Cao, Zhen-Fu
    Han, Li-Dong
    [J]. Tongxin Xuebao/Journal on Communications, 2014, 35 (07): : 33 - 37
  • [45] Provably secure convertible multi-authenticated encryption scheme
    Xie, Q.
    [J]. IET INFORMATION SECURITY, 2012, 6 (02) : 65 - 70
  • [46] Provably secure color image encryption algorithm based on FO 4D-HCS and ACM: Provably secure color image encryption..: S. Ullah et al.
    Ullah, Saeed
    Liu, Xinge
    Waheed, Adil
    Zhang, Shuailei
    [J]. Soft Computing, 2024, 28 (21) : 12879 - 12896
  • [47] Study on role-based IT strategy implementation mechanism
    Hao, XL
    [J]. Proceedings of the 2005 International Conference on Management Science & Engineering (12th), Vols 1- 3, 2005, : 187 - 191
  • [48] Auditing and Revocation Enabled Role-Based Access Control over Outsourced Private EHRs
    Liu, Weiran
    Liu, Xiao
    Liu, Jianwei
    Wu, Qianhong
    Zhang, Jun
    Li, Yan
    [J]. 2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 336 - 341
  • [49] Towards secure information sharing using role-based delegation
    Ahn, Gall-Joon
    Mohan, Badrinath
    Hong, Seng-Phil
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) : 42 - 59
  • [50] Provably secure group signature scheme with verifier-local revocation in the standard model
    Li, Ji-Guo
    Sun, Gang
    Zhang, Yi-Chen
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2011, 39 (07): : 1618 - 1623