Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage

被引:6
|
作者
Nomura, Kenta [1 ]
Mohri, Masami [2 ]
Shiraishi, Yoshiaki [1 ]
Morii, Masakatu [1 ]
机构
[1] Kobe Univ, Dept Elect Elect Engn, Kobe, Hyogo 6578501, Japan
[2] Gifu Univ, Informat & Multimedia Ctr, Gifu 5011193, Japan
关键词
ciphertext-policy attribute-based encryption; multiple key authorities; attribute revocation; forward secrecy; DATA ACCESS-CONTROL; BIG DATA; EFFICIENT;
D O I
10.1587/transinf.2016OFP0004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) has been widely applied in various fields. IoT data can also be put to cloud, but there are still concerns regarding security and privacy. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is attracted attention in cloud storage as a suitable encryption scheme for confidential data share and transmission. In CP-ABE, the secret key of a user is associated with a set of attributes; when attributes satisfy the access structure, the ciphertext is able to be decrypted. It is necessary that multiple authorities issue and manage secret keys independently. Authorities that generate the secret key can be regarded as managing the attributes of a user in CP-ABE. CP-ABE schemes that have multiple authorities have been proposed. The other hand, it should consider that a user's operation at the terminals is not necessary when a user drop an attribute and key is updated and the design of the communication system is a simple. In this paper, we propose CP-ABE scheme that have multiple key authorities and can revoke attribute immediately with no updating user's secret key for attribute revocation. In addition, the length of ciphertext is fixed. The proposed scheme is IND-CPA secure in DBDH assumption under the standard model. We compare the proposed scheme and the other CP-ABE schemes and show that the proposed scheme is more suitable for cloud storage.
引用
收藏
页码:2420 / 2431
页数:12
相关论文
共 50 条
  • [41] Multi-authority Based Weighted Attribute Encryption Scheme in Cloud Computing
    Wang, Yun
    Zhang, Dalei
    Zhong, Hong
    [J]. 2014 10TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2014, : 1033 - 1038
  • [42] Multi-authority attribute-based encryption access control scheme with hidden policy and constant length ciphertext for cloud storage
    Fan Yundong
    Wu Xiaoping
    Wang Jiasheng
    [J]. 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 205 - 212
  • [43] Secure and Efficient Multi-Authority Attribute-Based Encryption Scheme From Lattices
    Liu, Yuan
    Wang, Licheng
    Li, Lixiang
    Yan, Xixi
    [J]. IEEE ACCESS, 2019, 7 : 3665 - 3674
  • [44] Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Wu, Yulin
    Yiu, S. M.
    [J]. 2018 IEEE INT CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, UBIQUITOUS COMPUTING & COMMUNICATIONS, BIG DATA & CLOUD COMPUTING, SOCIAL COMPUTING & NETWORKING, SUSTAINABLE COMPUTING & COMMUNICATIONS, 2018, : 1003 - 1008
  • [45] Adaptively secure multi-authority attribute-based broadcast encryption in fog computing
    Chen, Jie
    Niu, Jiaxu
    Lei, Hao
    Lin, Li
    Ling, Yunhao
    [J]. COMPUTER NETWORKS, 2023, 232
  • [46] Revocable and Decentralized Attribute-Based Encryption
    Cui, Hui
    Deng, Robert H.
    [J]. COMPUTER JOURNAL, 2016, 59 (08): : 1220 - 1235
  • [47] Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
    Kai ZHANG
    Jianfeng MA
    Jiajia LIU
    Hui LI
    [J]. Science China(Information Sciences), 2016, 59 (09) : 256 - 258
  • [48] Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
    Zhang, Kai
    Ma, Jianfeng
    Liu, Jiajia
    Li, Hui
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (09)
  • [49] Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
    Kai Zhang
    Jianfeng Ma
    Jiajia Liu
    Hui Li
    [J]. Science China Information Sciences, 2016, 59
  • [50] Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing
    Zhang, Yinghui
    Zheng, Dong
    Li, Qi
    Li, Jin
    Li, Hui
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3688 - 3702