Data User-Based Attribute Based Encryption

被引:0
|
作者
Meamari, Ehsan [1 ]
Guo, Hao [1 ]
Shen, Chien-Chung [1 ]
Zhang, Rui [1 ]
机构
[1] Univ Delaware, Dept Comp & Informat Sci, Newark, DE 19716 USA
关键词
Attribute Based Encryption; ABE; CP-ABE; Decentralization;
D O I
10.1109/CISS48834.2020.1570617276
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute Based Encryption (ABE) has emerged as an informtion-centric public key cryptographic system which allows a data owner to share data, according to an access policy, with multiple data users based on the attributes they possess, without knowing their identities. In the original ABE schemes, a central authority administrates the system and issues secret keys to data users based on their attributes and both the owner and users need to trust a specific CA. However, in certain real-world applications, the data users would not trust anyone but themselves. For such situations, we introduce a new decentralization model of ABE, termed Data User-based ABE (DU-ABE), which is managed jointly by the data users. DU-ABE is the first decentralized ABE scheme which replaces the authorities with the data users without employing any other extra entities.
引用
收藏
页码:313 / 317
页数:5
相关论文
共 50 条
  • [31] NINU: An Incremental User-based Algorithm for Data Sparsity Recommender Systems
    Zhang, Yang
    Shen, Hua
    Zhou, Guoshun
    ADVANCES IN ENGINEERING DESIGN AND OPTIMIZATION III, PTS 1 AND 2, 2012, 201-202 : 428 - 432
  • [32] Revocable Attribute-Based Encryption With Data Integrity in Clouds
    Ge, Chunpeng
    Susilo, Willy
    Baek, Joonsang
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 2864 - 2872
  • [33] Protecting data in cloud environment with attribute-based encryption
    Zhu, Shuaishuai
    Yang, Xiaoyuan
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2015, 6 (02) : 91 - 97
  • [34] Study on Data Security Sharing Model Based on Attribute Encryption
    He, Jindong
    Tang, Zhijun
    Lian, Jiwen
    Wu, Fei
    Zhao, Zhichao
    Xie, Xinzhi
    2018 4TH INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND MATERIAL APPLICATION, 2019, 252
  • [35] Generic user revocation systems for attribute-based encryption in cloud storage
    Genlang Chen
    Zhiqian Xu
    Hai Jiang
    Kuan-ching Li
    Frontiers of Information Technology & Electronic Engineering, 2018, 19 : 1362 - 1384
  • [36] Generic user revocation systems for attribute-based encryption in cloud storage
    Genlang CHEN
    Zhiqian XU
    Hai JIANG
    Kuan-ching LI
    Frontiers of Information Technology & Electronic Engineering, 2018, 19 (11) : 1362 - 1384
  • [37] Generic user revocation systems for attribute-based encryption in cloud storage
    Chen, Genlang
    Xu, Zhiqian
    Jiang, Hai
    Li, Kuan-ching
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2018, 19 (11) : 1362 - 1384
  • [38] Security Encryption Analysis of Economic Big Data Based on Homomorphic Encryption and Attribute Base
    Chen, Limin
    International Journal of Network Security, 2024, 26 (02) : 299 - 304
  • [39] The Data-Gathering Broker - A User-Based Approach to Viable EPR Systems
    Rigby, Michael
    Budgen, David
    Brereton, Pearl
    Bennett, Keith
    Russell, Michelle
    Turner, Mark
    Kotsiopoulos, Ioannis
    Layzell, Paul
    Keane, John
    Zhu, Fujun
    CONNECTING MEDICAL INFORMATICS AND BIO-INFORMATICS, 2005, 116 : 905 - 910
  • [40] Attribute-based encryption implies identity-based encryption
    Herranz, Javier
    IET INFORMATION SECURITY, 2017, 11 (06) : 332 - 337