Attribute-based encryption scheme supporting decryption outsourcing and attribute revocation in cloud storage

被引:7
|
作者
Liu, Hongwei [1 ]
Zhu, Ping [1 ]
Chen, Zehong [1 ]
Zhang, Peng [2 ]
Jiang, Zoe L. [3 ,4 ]
机构
[1] Shenzhen Univ, Coll Informat Engn, Shenzhen, Peoples R China
[2] Shenzhen Univ, Coll Informat Engn, ATR Key Lab Natl Def Technol, Shenzhen, Peoples R China
[3] Harbin Insititute Technol Shenzhen Grad Sch, Shenzhen, Peoples R China
[4] Guangdong Prov Key Lab High Performance Comp, Guangzhou, Guangdong, Peoples R China
关键词
Cloud storage; ciphertext-policy attribute-based encryption; outsourced decryption; attribute revocation;
D O I
10.1109/CSE-EUC.2017.103
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Aiming to reduce the user's computational overhead and tackle the attribute revocation issue, an attribute-based encryption scheme supporting decryption outsourcing and attribute revocation is proposed in this paper. The proposed scheme outsources some decryption computational tasks to a cloud server such that the computational overhead on the user is simple and constant. We also propose an efficient attribute revocation method which concentrates on the update of the ciphertexts and users' secret keys associated with the corresponding revoked attributes. Moreover, the security analysis indicates that the proposed scheme can resist collusion attacks, and ensure forward and backward secrecy. Experiment results show that our scheme is more efficient compared with other scheme in the literature.
引用
收藏
页码:556 / 561
页数:6
相关论文
共 50 条
  • [1] Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
    Sun, Lei
    Zhao, Zhiyuan
    Wang, Jianhua
    Zhu, Zhiqiang
    [J]. Tongxin Xuebao/Journal on Communications, 2019, 40 (05): : 47 - 56
  • [2] Searchable attribute-based encryption scheme with attribute revocation in cloud storage
    Wang, Shangping
    Zhao, Duqiao
    Zhang, Yaling
    [J]. PLOS ONE, 2017, 12 (08):
  • [3] Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Yiu, S. M.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 108 : 112 - 123
  • [4] Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage
    Wang, Shangping
    Yao, Lisha
    Zhang, Yaling
    [J]. PLOS ONE, 2018, 13 (10):
  • [5] Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation
    Gao, Jiaxin
    Sun, Jiameng
    Qin, Jing
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2160 - 2169
  • [6] Generic attribute revocation systems for attribute-based encryption in cloud storage
    Chen, Genlang
    Xu, Zhiqian
    Zhang, Jia-jian
    Wang, Guo-jun
    Jiang, Hai
    Huang, Miao-qing
    [J]. FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2019, 20 (06) : 773 - 786
  • [7] Generic attribute revocation systems for attribute-based encryption in cloud storage
    Genlang Chen
    Zhiqian Xu
    Jia-jian Zhang
    Guo-jun Wang
    Hai Jiang
    Miao-qing Huang
    [J]. Frontiers of Information Technology & Electronic Engineering, 2019, 20 : 773 - 786
  • [8] Hierarchy Attribute-Based Encryption Scheme to Support Direct Revocation in Cloud Storage
    Jiang Shuci
    Guo Weibin
    Fan Guisheng
    [J]. 2017 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS 2017), 2017, : 869 - 874
  • [9] Adaptively Secure Attribute-Based Encryption Supporting Attribute Revocation
    Wu Qiuxin
    Zhang Miao
    [J]. CHINA COMMUNICATIONS, 2012, 9 (09) : 22 - 40
  • [10] Attribute-Based Online/Offline Encryption with Outsourcing Decryption
    Wang, Zhan-Jun
    Ma, Hai-Ying
    Wang, Jin-Hua
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (06) : 1595 - 1611