Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage

被引:25
|
作者
Wang, Shangping [1 ]
Guo, Keke [1 ]
Zhang, Yaling [2 ]
机构
[1] Xian Univ Technol, Sch Sci, Xian, Shaanxi, Peoples R China
[2] Xian Univ Technol, Sch Comp Sci & Engn, Xian, Shaanxi, Peoples R China
来源
PLOS ONE | 2018年 / 13卷 / 09期
基金
中国国家自然科学基金;
关键词
D O I
10.1371/journal.pone.0203225
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user may have multiple attributes, and each attribute may be shared simultaneously by many users. The decryption key of an attribute can thus be shared by many users who all possess the attribute. For monetary gain, a malicious authorized user may reveal his/her decryption key to a third party, and it is difficult to trace the owner of primitive secret key from an exposed key. At the same time, this situation may also limit commercial applications of CP-ABE systems. To solve these problems and enable fine-grained access control for the encrypted data, we propose a traceable CP-ABE scheme with attribute-level user revocation for cloud storage (TUR-CPABE). Our scheme enjoys four advantages. First, it has the ability to trace malicious users who have leaked key information from the system. Second, it supports attributelevel user revocation for malicious users and allows ABE fine-grained access control. Third, it allows secret key updates and ciphertext updates to resist collusion attacks between users. Fourth, outsourcing encryption, decryption and attribute revocation are used to reduce the computational burden on data owners, data users and the trust authority, respectively. In addition, our scheme has been proven to be secure against chosen plaintext attacks under a selective access policy based on decisional q +/- BDHE assumption in the standard model.
引用
收藏
页数:23
相关论文
共 50 条
  • [1] Research on Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage
    Wang, Guangbo
    Wang, Jianhua
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2017, 2017
  • [2] Large Universe Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage
    Lian, Huijie
    Wang, Qingxian
    Wang, Guangbo
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2020, 17 (01) : 107 - 117
  • [3] Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage (vol 13, e0203225, 2018)
    Wang, S.
    Guo, K.
    Zhang, Y.
    [J]. PLOS ONE, 2018, 13 (10):
  • [4] Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage
    Li, Jiguo
    Shi, Yuerong
    Zhang, Yichen
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)
  • [5] Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service
    Yu, Gang
    Wang, Yongjuan
    Cao, Zhenfu
    Lin, Jian
    Wang, Xiangyu
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04):
  • [6] Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
    Yong CHENG
    Zhi-ying WANG
    Jun MA
    Jiang-jiang WU
    Song-zhu MEI
    Jiang-chun REN
    [J]. Frontiers of Information Technology & Electronic Engineering, 2013, (02) : 85 - 97
  • [7] Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
    Cheng, Yong
    Wang, Zhi-ying
    Ma, Jun
    Wu, Jiang-jiang
    Mei, Song-zhu
    Ren, Jiang-chun
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2013, 14 (02): : 85 - 97
  • [8] Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
    Yong Cheng
    Zhi-ying Wang
    Jun Ma
    Jiang-jiang Wu
    Song-zhu Mei
    Jiang-chun Ren
    [J]. Journal of Zhejiang University SCIENCE C, 2013, 14 : 85 - 97
  • [9] Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
    Yong CHENG
    Zhi-ying WANG
    Jun MA
    Jiang-jiang WU
    Song-zhu MEI
    Jiang-chun REN
    [J]. JournalofZhejiangUniversity-ScienceC(Computers&Electronics)., 2013, 14 (02) - 97
  • [10] Expressive ciphertext-policy attribute-based encryption with direct user revocation
    Bai, Cuicui
    Zhang, Yinghui
    Ma, Hua
    Liu, Zhenhua
    [J]. International Journal of Embedded Systems, 2017, 9 (06) : 495 - 504