Efficient Revocable Attribute-Based Encryption with Hidden Policies

被引:5
|
作者
Ziegler, Dominik [1 ]
Marsalek, Alexander [2 ]
机构
[1] Know Ctr GmbH, Graz, Austria
[2] Graz Univ Technol, IAIK, Graz, Austria
关键词
access control; revocation; attribute-based encryption; hidden policies; CP-ABE; PROTOCOLS;
D O I
10.1109/TrustCom50675.2020.00226
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present a novel Ciphertext-Policy Attribute-Based Encryption (CP-ABE) scheme, which bridges the gap between highly dynamic (industrial) environments and resource constrained devices. Our construction combines outsourced-decryption, hidden policies and revocation to cope with the requirements posed by such environments. In contrast to existing schemes, which typically rely on composite order bilinear groups, we present a scheme in prime order groups. The resulting scheme is more efficient as it relies on smaller group orders. We prove our scheme is secure under the Symmetric External Diffie-Hellman (SXDH) assumption. Lastly, we compare our scheme against existing schemes and provide tuning results of our software implementation. Our evaluation shows that the proposed scheme is flexible enough for the targeted environment while improving performance by an order of magnitude.
引用
收藏
页码:1638 / 1645
页数:8
相关论文
共 50 条
  • [1] Efficient revocable attribute-based encryption scheme
    Li, Xuejun
    Zhang, Dan
    Li, Hui
    [J]. Tongxin Xuebao/Journal on Communications, 2019, 40 (06): : 32 - 39
  • [2] Revocable and Decentralized Attribute-Based Encryption
    Cui, Hui
    Deng, Robert H.
    [J]. COMPUTER JOURNAL, 2016, 59 (08): : 1220 - 1235
  • [3] Efficient Revocable Attribute-Based Encryption With Verifiable Data Integrity
    Chen, Shaobo
    Li, Jiguo
    Zhang, Yichen
    Han, Jinguang
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) : 10441 - 10451
  • [4] Attribute-Based Encryption with Partially Hidden Ciphertext Policies
    Nishide, Takashi
    Yoneyama, Kazuki
    Ohta, Kazuo
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (01) : 22 - 32
  • [5] Fully secure revocable attribute-based encryption
    Qian J.-L.
    Dong X.-L.
    [J]. Journal of Shanghai Jiaotong University (Science), 2011, 16 (4) : 490 - 496
  • [6] Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems
    Ma, Hua
    Xie, Ying
    Wang, Jianfeng
    Tian, Guohua
    Liu, Zhenhua
    [J]. IEEE ACCESS, 2019, 7 : 89205 - 89217
  • [7] Fully Secure Revocable Attribute-Based Encryption
    钱俊磊
    董晓蕾
    [J]. Journal of Shanghai Jiaotong University(Science), 2011, 16 (04) : 490 - 496
  • [8] Revocable Attribute-Based Encryption With Data Integrity in Clouds
    Ge, Chunpeng
    Susilo, Willy
    Baek, Joonsang
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 2864 - 2872
  • [9] Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage
    Ming, Yang
    He, Baokang
    Wang, Chenhao
    [J]. IEEE ACCESS, 2021, 9 : 42593 - 42603
  • [10] Revocable attribute-based encryption from standard lattices
    Luo, Fucai
    Al-Kuwari, Saif
    Wang, Haiyan
    Wang, Fuqun
    Chen, Kefei
    [J]. COMPUTER STANDARDS & INTERFACES, 2023, 84