Attribute Revocable Attribute-Based Encryption for Decentralized Disruption-Tolerant Military Networks

被引:3
|
作者
Nomura, Kenta [1 ]
Mohri, Masami [2 ]
Ii, Yoshiaki Si Iiraisi [1 ]
Morii, Masakatu [1 ]
机构
[1] Kobe Univ, Kobe, Hyogo 6578501, Japan
[2] Gifu Univ, Gifu 5011193, Japan
关键词
disruption-tolerant network; ciphertext-policy attribute-based encryption; multiple key authorities; attribute revocation; forward secrecy;
D O I
10.1109/CANDAR.2015.112
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Disruption-tolerant network technologies are becoming solutions to access the confidential information or command by exploiting external storage node. It is necessary to encrypt the shared data to prevent illegal access to ciphertext by the third party. It is expected that commanders could control whether the user can decrypt the ciphertext or not. Besides, it is essential that a key authority distributing keys to users is decentralized to several authorities for avoiding the invasion from enemy. Thus, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) as a suitable encryption scheme for confidential data share and transmission is attracted attention under the military environment. In CP-ABE, the secret key of a user is associated with a set of atrributes; when attributes satisfy the access structure, the ciphertext is able to be decrypted. In this paper, we propose a CP-ABE scheme which can revoke attribute immediately with no updating user's secret key for attribute revocation. In addition, the length of key and ciphertext are fixed. Furthermore the proposed scheme has been compared with other CP-ABE schemes in key size, ciphertext size to validate its efficiency.
引用
收藏
页码:491 / 494
页数:4
相关论文
共 50 条
  • [1] Revocable and Decentralized Attribute-Based Encryption
    Cui, Hui
    Deng, Robert H.
    [J]. COMPUTER JOURNAL, 2016, 59 (08): : 1220 - 1235
  • [2] Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System
    Ping Yu
    Qiaoyan Wen
    Wei Ni
    Wenmin Li
    Caijun Sun
    Hua Zhang
    Zhengping Jin
    [J]. Wireless Personal Communications, 2019, 106 : 719 - 738
  • [3] Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System
    Yu, Ping
    Wen, Qiaoyan
    Ni, Wei
    Li, Wenmin
    Sun, Caijun
    Zhang, Hua
    Jin, Zhengping
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (02) : 719 - 738
  • [4] Efficient revocable attribute-based encryption scheme
    Li, Xuejun
    Zhang, Dan
    Li, Hui
    [J]. Tongxin Xuebao/Journal on Communications, 2019, 40 (06): : 32 - 39
  • [5] Fully secure revocable attribute-based encryption
    Qian J.-L.
    Dong X.-L.
    [J]. Journal of Shanghai Jiaotong University (Science), 2011, 16 (4) : 490 - 496
  • [6] Fully Secure Revocable Attribute-Based Encryption
    钱俊磊
    董晓蕾
    [J]. Journal of Shanghai Jiaotong University(Science), 2011, 16 (04) : 490 - 496
  • [7] Decentralized Attribute-Based Encryption and Signatures
    Okamoto, Tatsuaki
    Takashima, Katsuyuki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 41 - 73
  • [8] Revocable Attribute-Based Encryption With Data Integrity in Clouds
    Ge, Chunpeng
    Susilo, Willy
    Baek, Joonsang
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 2864 - 2872
  • [9] Efficient Revocable Attribute-Based Encryption with Hidden Policies
    Ziegler, Dominik
    Marsalek, Alexander
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1638 - 1645
  • [10] Revocable attribute-based encryption from standard lattices
    Luo, Fucai
    Al-Kuwari, Saif
    Wang, Haiyan
    Wang, Fuqun
    Chen, Kefei
    [J]. COMPUTER STANDARDS & INTERFACES, 2023, 84