Fully secure revocable attribute-based encryption

被引:20
|
作者
Qian J.-L. [1 ]
Dong X.-L. [1 ]
机构
[1] Department of Computer Science and Engineering, Shanghai Jiaotong University
关键词
Attribute-based encryption (ABE); Dual encryption; Revocation;
D O I
10.1007/s12204-011-1178-4
中图分类号
学科分类号
摘要
Distributed information systems require complex access control which depends upon attributes of protected data and access policies. Traditionally, to enforce the access control, a file server is used to store all data and act as a reference to check the user. Apparently, the drawback of this system is that the security is based on the file server and the data are stored in plaintext. Attribute-based encryption (ABE) is introduced first by Sahai and Waters and can enable an access control mechanism over encrypted data by specifying the users' attributes. According to this mechanism, even though the file server is compromised, we can still keep the security of the data. Besides the access control, user may be deprived of the ability in some situation, for example paying TV. More previous ABE constructions are proven secure in the selective model of security that attacker must announce the target he intends to attack before seeing the public parameters. And few of previous ABE constructions realize revocation of the users' key. This paper presents an ABE scheme that supports revocation and has full security in adaptive model. We adapt the dual system encryption technique recently introduced by Waters to ABE to realize full security. © Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011.
引用
收藏
页码:490 / 496
页数:6
相关论文
共 50 条
  • [1] Fully Secure Revocable Attribute-Based Encryption
    钱俊磊
    董晓蕾
    [J]. Journal of Shanghai Jiaotong University(Science), 2011, 16 (04) : 490 - 496
  • [2] Generic Constructions for Fully Secure Revocable Attribute-Based Encryption
    Yamada, Kotoko
    Attrapadung, Nuttapong
    Emura, Keita
    Hanaoka, Goichiro
    Tanaka, Keisuke
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09): : 1456 - 1472
  • [3] Generic Constructions for Fully Secure Revocable Attribute-Based Encryption
    Yamada, Kotoko
    Attrapadung, Nuttapong
    Emura, Keita
    Hanaoka, Goichiro
    Tanaka, Keisuke
    [J]. COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 532 - 551
  • [4] Fully Secure Unbounded Revocable Key-Policy Attribute-Based Encryption Scheme
    Wang, Changji
    Fang, Jian
    Xie, Jianguo
    [J]. SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 251 - 264
  • [5] Revocable and Decentralized Attribute-Based Encryption
    Cui, Hui
    Deng, Robert H.
    [J]. COMPUTER JOURNAL, 2016, 59 (08): : 1220 - 1235
  • [6] Forward-Secure Data Outsourcing Based on Revocable Attribute-Based Encryption
    Hoang, Van-Hoan
    Lehtihet, Elyes
    Ghamri-Doudane, Yacine
    [J]. 2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1839 - 1846
  • [7] Efficient revocable attribute-based encryption scheme
    Li, Xuejun
    Zhang, Dan
    Li, Hui
    [J]. Tongxin Xuebao/Journal on Communications, 2019, 40 (06): : 32 - 39
  • [8] Server-Aided Revocable Attribute-Based Encryption Revised: Multi-User Setting and Fully Secure
    Cheng, Leixiao
    Meng, Fei
    [J]. COMPUTER SECURITY - ESORICS 2021, PT II, 2021, 12973 : 192 - 212
  • [9] Fully Secure Online/Offline Predicate and Attribute-Based Encryption
    Datta, Pratish
    Dutta, Ratna
    Mukhopadhyay, Sourav
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 331 - 345
  • [10] Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
    Lewko, Allison
    Okamoto, Tatsuaki
    Sahai, Amit
    Takashima, Katsuyuki
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 62 - +