Fine-grained user access control in ciphertext-policy attribute-based encryption

被引:7
|
作者
Hur, Junbeom [2 ]
Park, Chanil [3 ]
Hwang, Seong Oun [1 ]
机构
[1] Hongik Univ, Dept Comp & Informat Commun Engn, Chungnam, South Korea
[2] Univ Illinois, Dept Comp Sci, Urbana, IL 61801 USA
[3] Korea Adv Inst Sci & Technol, Dept Comp Sci, Taejon 305701, South Korea
基金
新加坡国家研究基金会;
关键词
ciphertext-policy; attribute-based encryption; revocation; access control; cryptography;
D O I
10.1002/sec.345
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key revocation is one of the most challenging and open issues in attribute-based encryption (ABE). The previous revocable ABE schemes feature a mechanism that revokes the attribute key periodically without any consideration of the user membership associated with the attribute. Thus, non-revoked users are enforced to access the key authority periodically to receive keying materials in order to update the current key. This is due to the fact that the revocation is done only on the attribute level, which results in security and scalability problems. In this paper, we propose a fine-grained user revocation scheme without affecting any non-revoked users who share the same attributes in ciphertext-policy ABE; it does not require the users to access the key authority and to update keys periodically. The proposed scheme improves the efficiency compared with previous revocable schemes and enhances the security in terms of the backward/forward secrecy on any membership changes in the ciphertext-policy ABE system. Copyright (C) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:253 / 261
页数:9
相关论文
共 50 条
  • [1] Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption
    Du, Jiajie
    HelIl, Nurmamat
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (09): : 3274 - 3297
  • [2] Fine-Grained Access Control for Cloud Data Sharing by Secure and Efficient Attribute-Revocable Ciphertext-Policy Attribute-Based Encryption
    Vaanchig, Nyamsuren
    Chen, Wei
    Qin, Zhiguang
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (10): : 303 - 319
  • [3] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [4] Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
    Li, Jiguo
    Wang, Haiping
    Zhang, Yichen
    Shen, Jian
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 3339 - 3352
  • [5] Ciphertext-Policy Attribute-Based Encryption with Hiding Access Structure
    Yadav, Umesh Chandra
    [J]. 2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 23 - 27
  • [6] A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update
    Liu, Zhe
    Wang, Fuqun
    Chen, Kefei
    Tang, Fei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [7] Dynamic Ciphertext-Policy Attribute-Based Encryption for Expressive Access Policy
    Rao, Y. Sreenivasa
    Dutta, Ratna
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2014, 2014, 8337 : 275 - 286
  • [8] Ciphertext-policy attribute-based delay encryption
    Chen, Lijiao
    Lv, Kewei
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (02) : 167 - 185
  • [9] Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment
    Nayudu, P. Prathap
    Sekhar, Krovi Raja
    [J]. Computer Systems Science and Engineering, 2023, 46 (01): : 1079 - 1092
  • [10] Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits
    MahdaviOliaee, Mahdi
    Ahmadian, Zahra
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023, 19 (04) : 515 - 528