Multiauthority Attribute-Based Encryption with Traceable and Dynamic Policy Updating

被引:11
|
作者
Ling, Jie [1 ]
Chen, Junwei [1 ]
Chen, Jiahui [1 ]
Gan, Wensheng [2 ]
机构
[1] Guangdong Univ Technol, Sch Comp, Guangzhou 510006, Peoples R China
[2] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Peoples R China
基金
中国国家自然科学基金;
关键词
OUTSOURCING DECRYPTION; CP-ABE; SECURE;
D O I
10.1155/2021/6661450
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext policy attribute-based encryption (CP-ABE) is an encryption mechanism that can provide fine-grained access control and adequate cloud storage security for Internet of Things (IoTs). In this field, the original CP-ABE scheme usually has only a single trusted authority, which will become a bottleneck in IoTs. In addition, different users may illegally share their private keys to obtain improper benefits. Besides, the data owners also require the flexibility to change their access policy. In this paper, we construct a multiauthority CP-ABE scheme on prime order groups over a large attribute universe. Our scheme can support white-box traceability along with policy updates to solve the abovementioned three problems and, thus, can fix the potential requirements of IoTs. More precisely, the proposed scheme supports multiple authority, white box traceability, large attribute domains, access policy updates, and high expressiveness. We prove that our designed scheme is static secure and traceable secure based on the state-of-the-art security models. Moreover, by theoretical comparison, our scheme has better performance than other schemes. Finally, extensive experimental comparisons show that our proposed algorithm can be better than the baseline algorithms.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Traceable Multiauthority Attribute-Based Encryption with Outsourced Decryption and Hidden Policy for CIoT
    Liu, Suhui
    Yu, Jiguo
    Hu, Chunqiang
    Li, Mengmeng
    [J]. Wireless Communications and Mobile Computing, 2021, 2021
  • [2] A Traceable and Revocable Multiauthority Attribute-Based Encryption Scheme with Fast Access
    Zhang, Kai
    Li, Yanping
    Song, Yun
    Lu, Laifeng
    Zhang, Tao
    Jiang, Qi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [3] Multiauthority Attribute-Based Encryption With Dynamic Membership From Lattices
    Zhuang, Er-Shuo
    Fan, Chun-, I
    Kuo, I-Hua
    [J]. IEEE ACCESS, 2022, 10 : 58254 - 58267
  • [4] Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating
    Ying, Zuobin
    Li, Hui
    Ma, Jianfeng
    Zhang, Junwei
    Cui, Jiangtao
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (04)
  • [5] Multiauthority Attribute-Based Encryption for Assuring Data Deletion
    Li, Jiguo
    Zhang, Ruyuan
    Lu, Yang
    Han, Jinguang
    Zhang, Yichen
    Zhang, Wenzheng
    Dong, Xinfeng
    [J]. IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2029 - 2038
  • [6] Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating
    Zuobin YING
    Hui LI
    Jianfeng MA
    Junwei ZHANG
    Jiangtao CUI
    [J]. Science China(Information Sciences), 2016, 59 (04) : 187 - 202
  • [7] Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation
    Gao, Jiaxin
    Sun, Jiameng
    Qin, Jing
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2160 - 2169
  • [8] Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme
    Fu, Xingbing
    Nie, Xuyun
    Li, Fagen
    [J]. INFORMATION, 2015, 6 (03): : 481 - 493
  • [9] Traceable Ciphertet-Policy Attribute-Based Encryption with Constant Decryption
    Wang, Guangbo
    Li, Feng
    Wang, Pengcheng
    Hu, Yixiao
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (09): : 3401 - 3420
  • [10] Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Yiu, S. M.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 108 : 112 - 123