Fully secure revocable attribute-based encryption

被引:20
|
作者
Qian J.-L. [1 ]
Dong X.-L. [1 ]
机构
[1] Department of Computer Science and Engineering, Shanghai Jiaotong University
关键词
Attribute-based encryption (ABE); Dual encryption; Revocation;
D O I
10.1007/s12204-011-1178-4
中图分类号
学科分类号
摘要
Distributed information systems require complex access control which depends upon attributes of protected data and access policies. Traditionally, to enforce the access control, a file server is used to store all data and act as a reference to check the user. Apparently, the drawback of this system is that the security is based on the file server and the data are stored in plaintext. Attribute-based encryption (ABE) is introduced first by Sahai and Waters and can enable an access control mechanism over encrypted data by specifying the users' attributes. According to this mechanism, even though the file server is compromised, we can still keep the security of the data. Besides the access control, user may be deprived of the ability in some situation, for example paying TV. More previous ABE constructions are proven secure in the selective model of security that attacker must announce the target he intends to attack before seeing the public parameters. And few of previous ABE constructions realize revocation of the users' key. This paper presents an ABE scheme that supports revocation and has full security in adaptive model. We adapt the dual system encryption technique recently introduced by Waters to ABE to realize full security. © Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011.
引用
收藏
页码:490 / 496
页数:6
相关论文
共 50 条
  • [21] Efficient Revocable Attribute-Based Encryption With Verifiable Data Integrity
    Chen, Shaobo
    Li, Jiguo
    Zhang, Yichen
    Han, Jinguang
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) : 10441 - 10451
  • [22] Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things
    Ali, Mohammad
    Sadeghi, Mohammad-Reza
    Liu, Ximeng
    [J]. IEEE ACCESS, 2020, 8 : 23951 - 23964
  • [23] Fully Secure Attribute-Based Encryption for t-CNF from LWE
    Tsabary, Rotem
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1, 2019, 11692 : 62 - 85
  • [24] Batch Attribute-Based Encryption for Secure Clouds
    Yang, Chen
    Sun, Yang
    Wu, Qianhong
    [J]. INFORMATION, 2015, 6 (04) : 704 - 718
  • [25] Adaptively Secure Attribute-Based Encryption Supporting Attribute Revocation
    Wu Qiuxin
    Zhang Miao
    [J]. CHINA COMMUNICATIONS, 2012, 9 (09) : 22 - 40
  • [26] Revocable Attribute-based Encryption with Escrow-free in Cloud Storage
    Zhao Zhiyuan
    Zhu Zhiqiang
    Wang Jianhua
    Sun Lei
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (01) : 1 - 10
  • [27] Attribute Revocable Attribute-Based Encryption for Decentralized Disruption-Tolerant Military Networks
    Nomura, Kenta
    Mohri, Masami
    Ii, Yoshiaki Si Iiraisi
    Morii, Masakatu
    [J]. PROCEEDINGS OF 2015 THIRD INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2015, : 491 - 494
  • [28] A Traceable and Revocable Multiauthority Attribute-Based Encryption Scheme with Fast Access
    Zhang, Kai
    Li, Yanping
    Song, Yun
    Lu, Laifeng
    Zhang, Tao
    Jiang, Qi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [29] Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System
    Ping Yu
    Qiaoyan Wen
    Wei Ni
    Wenmin Li
    Caijun Sun
    Hua Zhang
    Zhengping Jin
    [J]. Wireless Personal Communications, 2019, 106 : 719 - 738
  • [30] Server-Aided Revocable Attribute-Based Encryption from Lattices
    Dong, Xingting
    Zhang, Yanhua
    Wang, Baocang
    Chen, Jiangshan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020