A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection

被引:135
|
作者
Han, Dezhi [1 ]
Pan, Nannan [1 ]
Li, Kuan-Ching [2 ]
机构
[1] Shanghai Maritime Univ, Coll Informat Engn, Shanghai 201306, Peoples R China
[2] Providence Univ, Dept Comp Sci & Informat Engn CSIE, Taichung 43301, Taiwan
基金
中国国家自然科学基金;
关键词
Encryption; Binary trees; Privacy; Cloud computing; Access control; Binary tree; CP-ABE; hidden policy; revocation; traceability; REVOCATION; EFFICIENT; STORAGE; SEARCH; ABE;
D O I
10.1109/TDSC.2020.2977646
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Considered as a promising fine-grained access control mechanism for data sharing without a centralized trusted third-party, the access policy in a plaintext form may reveal sensitive information in the traditional CP-ABE method. To address this issue, a hidden policy needs to be applied to the CP-ABE scheme, as the identity of a user cannot be accurately confirmed when the decryption key is leaked, so the malicious user is traced and revoked as demanded. In this article, a CP-ABE scheme that realizes revocation, white-box traceability, and the application of hidden policy is proposed, and such ciphertext is composed of two parts. One is related to the access policy encrypted by the attribute value, and only the attribute name is evident in the access policy. Another is related to the revocation information and updated when revoking, where the revocation information is generated by the binary tree related to users. The leaf node value of a binary tree in the decryption key is used to trace the malicious user. From experimental results, it is shown that the proposed scheme is proven to be IND-CPA secure under the chosen plaintext attacks and selective access policy based on the decisional q-BDHE assumption in the standard model, efficient, and promising.
引用
收藏
页码:316 / 327
页数:12
相关论文
共 50 条
  • [1] Traceable-then-revocable ciphertext-policy attribute-based encryption scheme
    Liu, Zhenhua
    Duan, Shuhong
    Zhou, Peilin
    Wang, Baocang
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 903 - 913
  • [2] Enhancing Data Privacy Protection in Ciphertext-Policy Attribute-Based Encryption
    Patil, Sachin Popat
    Basthikodi, Mustafa
    Kumaraswamy, S.
    Gurpur, Ananth Prabhu
    Raga, Akashraj
    [J]. JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (03) : 1113 - 1124
  • [3] Traceable Ciphertext-policy Attribute-based Encryption Scheme with Constant Decryption Costs
    Wang Jianhua
    Wang Guangbo
    Xu Yang
    Hu Yixiao
    Zhang Yue
    Fan Liwen
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (04) : 802 - 810
  • [4] A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update
    Liu, Zhe
    Wang, Fuqun
    Chen, Kefei
    Tang, Fei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [5] An Improved Ciphertext-Policy Attribute-Based Encryption Scheme
    Zheng, Hua
    Zhang, Xi
    Yang, Qi
    [J]. SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 400 - 411
  • [6] Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme
    Asim, Muhammad
    Ibraimi, Luan
    Petkovic, Milan
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 244 - +
  • [7] TRAK-CPABE: A novel Traceable, Revocable and Accountable Ciphertext-Policy Attribute-Based Encryption scheme in cloud computing
    Bouchaala, Mariem
    Ghazel, Cherif
    Saidane, Leila Azzouz
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61
  • [8] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [9] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
    Emura, Keita
    Miyaji, Atsuko
    Nomura, Akito
    Omote, Kazumasa
    Soshi, Masakazu
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 13 - +
  • [10] Directly Revocable Attribute Based Encryption Scheme under Ciphertext-Policy
    Aqeel, Humera
    Ali, Syed Taqi
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 365 - 369