Fine-grained user access control in ciphertext-policy attribute-based encryption

被引:7
|
作者
Hur, Junbeom [2 ]
Park, Chanil [3 ]
Hwang, Seong Oun [1 ]
机构
[1] Hongik Univ, Dept Comp & Informat Commun Engn, Chungnam, South Korea
[2] Univ Illinois, Dept Comp Sci, Urbana, IL 61801 USA
[3] Korea Adv Inst Sci & Technol, Dept Comp Sci, Taejon 305701, South Korea
基金
新加坡国家研究基金会;
关键词
ciphertext-policy; attribute-based encryption; revocation; access control; cryptography;
D O I
10.1002/sec.345
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key revocation is one of the most challenging and open issues in attribute-based encryption (ABE). The previous revocable ABE schemes feature a mechanism that revokes the attribute key periodically without any consideration of the user membership associated with the attribute. Thus, non-revoked users are enforced to access the key authority periodically to receive keying materials in order to update the current key. This is due to the fact that the revocation is done only on the attribute level, which results in security and scalability problems. In this paper, we propose a fine-grained user revocation scheme without affecting any non-revoked users who share the same attributes in ciphertext-policy ABE; it does not require the users to access the key authority and to update keys periodically. The proposed scheme improves the efficiency compared with previous revocable schemes and enhances the security in terms of the backward/forward secrecy on any membership changes in the ciphertext-policy ABE system. Copyright (C) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:253 / 261
页数:9
相关论文
共 50 条
  • [31] Blind attribute-based encryption and oblivious transfer with fine-grained access control
    Alfredo Rial
    [J]. Designs, Codes and Cryptography, 2016, 81 : 179 - 223
  • [32] Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application
    Ibraimi, Luan
    Petkovic, Milan
    Nikova, Svetla
    Hartel, Pieter
    Jonker, Willem
    [J]. INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 309 - +
  • [33] An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption
    Balu, A.
    Kuppusamy, K.
    [J]. INFORMATION SCIENCES, 2014, 276 : 354 - 362
  • [34] ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    [J]. BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, 2009, 46 (04) : 803 - 819
  • [35] Ciphertext-policy attribute-based encryption scheme with verifiability on authority
    Yu, Jinxia
    He, Xu
    Yan, Xixi
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (04): : 49 - 57
  • [36] Blind attribute-based encryption and oblivious transfer with fine-grained access control
    Rial, Alfredo
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2016, 81 (02) : 179 - 223
  • [37] Attribute-Based Encryption for Fine-Grained Access Control on Secure Hybrid Clouds
    Vulapula, Sridhar Reddy
    Malladi, Srinivas
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (10) : 380 - 387
  • [38] Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation
    Ghopur, Dilxat
    Ma, Jianfeng
    Ma, Xindi
    Miao, Yinbin
    Hao, Jialu
    Jiang, Tao
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2023, 66 (07)
  • [39] Novel Constructions for Ciphertext-Policy Attribute-Based Searchable Encryption
    Brigitthe Hinojosa-Cabello, Melissa
    Morales-Sandoval, Miguel
    Marin-Castro, Heidy M.
    [J]. 2022 IEEE MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE (ENC), 2022,
  • [40] An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme with Policy Update
    Wang, Changji
    Yuan, Yuan
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (02): : 1031 - 1041