A Multi-authority Attribute-Based Encryption Access Control for Social Network

被引:0
|
作者
Yang, Xiao-dong [1 ]
Yang, Miao-miao [1 ]
Yang, Ping [1 ]
Leng, Qi [1 ]
机构
[1] Northwest Normal Univ, Coll Comp Sci & Engn, Lanzhou, Gansu, Peoples R China
基金
中国博士后科学基金;
关键词
privacy protection; decryption outsourcing; attribute-based encryption; linear secret sharing scheme; user revocation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to solve the problems of privacy protection and the user revokes in social network, a multi-authority attribute-based encryption access control for social network is presented. In the proposed scheme, we utilizes the linear secret sharing scheme and the proxy re-encryption technique to achieve the user rights update and support flexible access control strategy. Multiple authorities jointly distributes the attribute key of a user so that it effectively avoid the security risk caused by the excessive power of a single authorized center. Furthermore, by introducing decryption outsourcing technology, it can effectively reduce the computational overhead of users. The results show that this scheme has high performance on decryption operations, and the communication cost is small in terms of user revocation.
引用
收藏
页码:671 / 674
页数:4
相关论文
共 50 条
  • [1] Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption
    Li, Yang
    Qi, Baoyue
    Wang, Mengmeng
    Zhu, Jianming
    Wang, Xiuli
    [J]. DATA SCIENCE (ICPCSEE 2022), PT II, 2022, 1629 : 105 - 124
  • [2] Multi-Authority Attribute-Based Encryption Access Control Scheme in Wireless Body Area Network
    Xiao, Min
    Hu, Xiaoyong
    [J]. 2018 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS ENGINEERING (ICISE), 2018, : 39 - 45
  • [3] Efficient Multi-authority Access Control using Attribute-based Encryption in Cloud Storage
    Challagidad, Praveen S.
    Birje, Mahantesh N.
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 840 - 849
  • [4] A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy
    Qi, Fang
    Li, Ke
    Tang, Zhe
    [J]. 2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 607 - 613
  • [5] Multi-Authority Attribute-Based Access Control with Smart Contract
    Guo, Hao
    Meamari, Ehsan
    Shen, Chien-Chung
    [J]. 2019 INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY (ICBCT 2019), 2019, : 6 - 11
  • [6] Attribute-Based Data Access Control for Multi-Authority System
    Salehi, Ahmad S.
    Rudolph, Carsten
    Grobler, Marthie
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1834 - 1841
  • [7] A survey on multi-authority and decentralized attribute-based encryption
    Prince Silas Kwesi Oberko
    Victor-Hillary Kofi Setornyo Obeng
    Hu Xiong
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 515 - 533
  • [8] A survey on multi-authority and decentralized attribute-based encryption
    Oberko, Prince Silas Kwesi
    Obeng, Victor-Hillary Kofi Setornyo
    Xiong, Hu
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (01) : 515 - 533
  • [9] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Zhong, Hong
    Zhu, Wenlong
    Xu, Yan
    Cui, Jie
    [J]. SOFT COMPUTING, 2018, 22 (01) : 243 - 251
  • [10] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Hong Zhong
    Wenlong Zhu
    Yan Xu
    Jie Cui
    [J]. Soft Computing, 2018, 22 : 243 - 251