A fully distributed hierarchical attribute-based encryption scheme

被引:22
|
作者
Ali, Mohammad [1 ]
Mohajeri, Javad [2 ]
Sadeghi, Mohammad-Reza [1 ]
Liu, Ximeng [3 ,4 ]
机构
[1] Amirkabir Univ Technol, Dept Math & Comp Sci, Tehran, Iran
[2] Sharif Univ Technol, Elect Res Inst, Tehran, Iran
[3] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350108, Peoples R China
[4] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
关键词
Cloud computing; Hierarchical attribute-based encryption; Ciphertext-policy attribute-based encryption; Access control; IDENTITY-BASED ENCRYPTION; DATA ACCESS; CIPHERTEXT; SECURE;
D O I
10.1016/j.tcs.2020.02.030
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the development of cloud computing, many enterprises have been interested in outsourcing their data to cloud servers to decrease IT costs and rise capabilities of provided services. To afford confidentiality and fine-grained data access control, attribute-based encryption (ABE) was proposed and used in several cloud storage systems. However, scalability and flexibility in key delegation and user revocation mechanisms are primary issues in ABE systems. In this paper, we introduce the concept of a fully distributed revocable ciphertext-policy hierarchical ABE (FDR-CP-HABE) and design the first FDR-CP-HABE scheme. Our scheme offers a high level of flexibility and scalability in the key delegation and user revocation phases. Moreover, our scheme is efficient and provides lightweight computation in the decryption phase. Indeed, by exploiting a computation outsourcing technique, most of the operations are executed by the powerful cloud server, and very few computations are left to the users. Also, the storage cost on the user side is significantly decreased as compared to similar schemes. Furthermore, using the hardness assumption of DBDH problem, we prove that our scheme is adaptively secure in the standard model. Our security analyses and implementation results indicate that our scheme is efficient, secure, and scalable. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:25 / 46
页数:22
相关论文
共 50 条
  • [1] A Hierarchical Attribute-Based Encryption Scheme
    ZOU Xiubin
    [J]. Wuhan University Journal of Natural Sciences, 2013, 18 (03) : 259 - 264
  • [2] Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
    Lewko, Allison
    Okamoto, Tatsuaki
    Sahai, Amit
    Takashima, Katsuyuki
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 62 - +
  • [3] Distributed Attribute-Based Encryption
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 20 - 36
  • [4] Attribute-based Encryption Scheme with Fast Encryption
    Luo, Wang-Ping
    Feng, Chao-Sheng
    Zou, Li-Ping
    Yuan, Ding
    Wu, Tang-Mei
    Li, Min
    Wang, Guang-Jie
    [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (12): : 3923 - 3936
  • [5] Attribute-Based Encryption Scheme Based on SIFF
    Zhao, Tianyu
    Wei, Lingbo
    Zhang, Chi
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [6] Fully secure revocable attribute-based encryption
    Qian J.-L.
    Dong X.-L.
    [J]. Journal of Shanghai Jiaotong University (Science), 2011, 16 (4) : 490 - 496
  • [7] Fully Secure Revocable Attribute-Based Encryption
    钱俊磊
    董晓蕾
    [J]. Journal of Shanghai Jiaotong University(Science), 2011, 16 (04) : 490 - 496
  • [8] Attribute-Based Fully Homomorphic Encryption Scheme from Lattices with Short Ciphertext
    Liu, Yuan
    Pan, Yun
    Gu, Lize
    Zhang, Yuan
    An, Dezhi
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021
  • [9] A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing
    Fu, Junsong
    Wang, Na
    [J]. IEEE ACCESS, 2019, 7 : 36218 - 36232
  • [10] Software Implementation of an Attribute-Based Encryption Scheme
    Zavattoni, Eric
    Dominguez Perez, Luis J.
    Mitsunari, Shigeo
    Sanchez-Ramirez, Ana H.
    Teruya, Tadanori
    Rodriguez-Henriquez, Francisco
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (05) : 1429 - 1441