A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection

被引:135
|
作者
Han, Dezhi [1 ]
Pan, Nannan [1 ]
Li, Kuan-Ching [2 ]
机构
[1] Shanghai Maritime Univ, Coll Informat Engn, Shanghai 201306, Peoples R China
[2] Providence Univ, Dept Comp Sci & Informat Engn CSIE, Taichung 43301, Taiwan
基金
中国国家自然科学基金;
关键词
Encryption; Binary trees; Privacy; Cloud computing; Access control; Binary tree; CP-ABE; hidden policy; revocation; traceability; REVOCATION; EFFICIENT; STORAGE; SEARCH; ABE;
D O I
10.1109/TDSC.2020.2977646
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Considered as a promising fine-grained access control mechanism for data sharing without a centralized trusted third-party, the access policy in a plaintext form may reveal sensitive information in the traditional CP-ABE method. To address this issue, a hidden policy needs to be applied to the CP-ABE scheme, as the identity of a user cannot be accurately confirmed when the decryption key is leaked, so the malicious user is traced and revoked as demanded. In this article, a CP-ABE scheme that realizes revocation, white-box traceability, and the application of hidden policy is proposed, and such ciphertext is composed of two parts. One is related to the access policy encrypted by the attribute value, and only the attribute name is evident in the access policy. Another is related to the revocation information and updated when revoking, where the revocation information is generated by the binary tree related to users. The leaf node value of a binary tree in the decryption key is used to trace the malicious user. From experimental results, it is shown that the proposed scheme is proven to be IND-CPA secure under the chosen plaintext attacks and selective access policy based on the decisional q-BDHE assumption in the standard model, efficient, and promising.
引用
下载
收藏
页码:316 / 327
页数:12
相关论文
共 50 条
  • [41] Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    SENSORS, 2019, 19 (07)
  • [42] Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation
    Yu, Gang
    Ma, Xiaoxiao
    Cao, Zhenfu
    Zhu, Weihua
    Zeng, Guang
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 172 - 179
  • [43] Conditional Ciphertext-Policy Attribute-Based Encryption Scheme in Vehicular Cloud Computing
    Guan, Zhitao
    Li, Jing
    Zhang, Zijian
    Zhu, Liehuang
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [44] CP-ABSE: A Ciphertext-Policy Attribute-Based Searchable Encryption Scheme
    Yin, Hui
    Zhang, Jixin
    Xiong, Yinqiao
    Ou, Lu
    Li, Fangmin
    Liao, Shaolin
    Li, Keqin
    IEEE ACCESS, 2019, 7 : 5682 - 5694
  • [45] A Regulation Scheme Based on the Ciphertext-Policy Hierarchical Attribute-Based Encryption in Bitcoin System
    Wang, Yuxiao
    Gao, Juntao
    IEEE ACCESS, 2018, 6 : 16267 - 16278
  • [46] A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Arithmetic Span Program
    Wei D.
    Gao H.-Y.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2020, 48 (10): : 1993 - 2002
  • [47] White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes
    Ning, Jianting
    Dong, Xiaolei
    Cao, Zhenfu
    Wei, Lifei
    Lin, Xiaodong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (06) : 1274 - 1288
  • [48] Ciphertext-policy weighted attribute based encryption scheme
    Liu, Ximeng
    Ma, Jianfeng
    Xiong, Jinbo
    Li, Qi
    Zhang, Tao
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2013, 47 (08): : 44 - 48
  • [49] DSSPS: A Data Sharing Security Protection Scheme Based on Consortium Blockchain and Ciphertext-Policy Attribute-Based Encryption
    Han, Daojun
    Chen, Jinyu
    Zang, Guoqing
    Wang, Xueheng
    Gao, Yihua
    ICBTA 2019: 2019 2ND INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY AND APPLICATIONS, 2019, : 14 - 19
  • [50] A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare Scenarios
    Zhao, Yang
    Liu, Zhaozhong
    An, Jingmin
    Zhu, Guobin
    Kumari, Saru
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2022, 2022, 13620 : 624 - 639