Updatable Ciphertext-Policy Attribute-Based Encryption Scheme With Traceability and Revocability

被引:20
|
作者
Liu, Zhenhua [1 ]
Xu, Jing [1 ]
Liu, Yan [1 ]
Wang, Baocang [2 ]
机构
[1] Xidian Univ, Sch Math & Stat, Xian 710071, Shaanxi, Peoples R China
[2] Xuchang Univ, Sch Informat Engn, Xuchang 461000, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Cloud storage; access control; attribute-based encryption; traceability; revocability; updatability; CLOUD; REVOCATION; ABE;
D O I
10.1109/ACCESS.2019.2918434
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-policy attribute-based encryption (CP-ABE) can offer fine-grained access control over encrypted data, which is suitable for complex commercial applications. However, since the same decryption privileges could be shared by multiple users in the one-to-many encryption mechanism, it is dangerous that a malicious user misuses his secret key but cannot be traced. In addition to further security, when the malicious user has been caught, it is required to revoke him from the system. To address these problems, we propose a novel updatable CP-ABE scheme supporting white-box traceability and traitor revocation. In the proposed scheme, a "fixed point" is embedded into the user's secret key to achieving the traceability and each user is assigned with a unique identifier for revocation. Moreover, the secret exponent used to encrypt a message is divided into two parts: one is assigned to access policy and the other to the revocation list. Therefore, only a part of the ciphertext components needs to be updated when the revocation list is changed, which greatly simplifies the process of ciphertext update. Compared to the previous works, our scheme is more efficient, and can achieve valid revocation and ciphertext update. In addition, the traceability of the proposed scheme is depended on the l-Strong Difffie-Hellman assumption, and the indistinguishability security under selective access policy and chosen-plaintext attacks in the standard model is reduced to the Decisional q-Bilinear Diffie-Hellman assumption. Furthermore, the experimental results show that the proposed scheme is efficient.
引用
下载
收藏
页码:66832 / 66844
页数:13
相关论文
共 50 条
  • [41] Dynamic Ciphertext-Policy Attribute-Based Encryption for Expressive Access Policy
    Rao, Y. Sreenivasa
    Dutta, Ratna
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2014, 2014, 8337 : 275 - 286
  • [42] Outsourced ciphertext-policy attribute-based encryption with partial policy hidden
    Yu, Jinxia
    He, Guanghui
    Yan, Xixi
    Tang, Yongli
    Qin, Rongxia
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (05)
  • [43] New Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation
    Zu, Longhui
    Liu, Zhenhua
    Li, Juanjuan
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 281 - 287
  • [44] Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
    Deng, Hua
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    Zhang, Lei
    Liu, Jianwei
    Shi, Wenchang
    INFORMATION SCIENCES, 2014, 275 : 370 - 384
  • [45] Optimized Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation
    Li, Yang
    Zhu, Jianming
    Wang, Xiuli
    Chai, Yanmei
    Shao, Shuai
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 385 - 394
  • [46] Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
    Shijie Deng
    Gaobo Yang
    Wen Dong
    Ming Xia
    Multimedia Tools and Applications, 2023, 82 : 22251 - 22274
  • [47] A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update
    Liu, Zhe
    Wang, Fuqun
    Chen, Kefei
    Tang, Fei
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [48] Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
    Deng, Shijie
    Yang, Gaobo
    Dong, Wen
    Xia, Ming
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (14) : 22251 - 22274
  • [49] Modified Ciphertext-Policy Attribute-Based Encryption Scheme with Efficient Revocation for PHR System
    Zheng, Hongying
    Wu, Jieming
    Wang, Bo
    Chen, Jianyong
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2017, 2017
  • [50] An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Collaborative Decryption With Blockchain
    He, Ying
    Wang, Haiyan
    Li, Yuan
    Huang, Ke
    Leung, Victor C. M.
    Yu, F. Richard
    Ming, Zhong
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) : 2722 - 2733