Attribute-based encryption scheme with efficient revocation in data outsourcing systems
academic paper|更新时间:2024-06-05
|
Attribute-based encryption scheme with efficient revocation in data outsourcing systems
Journal on CommunicationsVol. 36, Issue 10, Pages: 92-100(2015)
作者机构:
河南理工大学 计算机科学与技术学院,河南 焦作 454003
作者简介:
基金信息:
The National Natural Science Foundation of China(61300216);The Science and Technology Project of Henan Province(132102210123);Research Fund for the Doctoral Program of Henan Polytechnic University(B2013-043)
Xi-xi YAN, Yong-li TANG. Attribute-based encryption scheme with efficient revocation in data outsourcing systems[J]. Journal on Communications, 2015, 36(10): 92-100.
DOI:
Xi-xi YAN, Yong-li TANG. Attribute-based encryption scheme with efficient revocation in data outsourcing systems[J]. Journal on Communications, 2015, 36(10): 92-100. DOI: 10.11959/j.issn.1000-436x.2015254.
Attribute-based encryption scheme with efficient revocation in data outsourcing systems
In order to support fine-grained attribute revocation in data outsourcing systems
an attribute-based encryption scheme with efficient revocation in indirect revocation model was proposed.The model of ABE supporting attribute revocation was given
and a concrete scheme was constructed which proved its security under the standard model.Compared to the existing related schemes
the size of ciphertext and private/secret key is reduced
and the new scheme achieves fine-grained and immediate attribute revocation which is more suitable for the practical applications.
关键词
Keywords
references
SAHAI A , WATERS B . Fuzzy identity-based encryption [A ] . Advances in Cryptology - EUROCRYPT 2005 [C ] . Berlin,Heidelberg,Springer Verlag , 2005 . 457 - 473 .
OSTROVSKY R , SAHAI A , WATERS B . Attribute-based encryption with non-monotonic access structures [A ] . Proc of the ACM Conf on Computer and Communications Security [C ] . New York , 2007 . 195 - 203 .
ATTAPADUNG N , IMAI H . Conjunctive broadcast and attribute-based encryption [A ] . Proc of the Pairing-Based CryptographyPairing 2009 [C ] . Berlin,Heidelberg : Springer-Verlag , 2009 . 248 - 265 .
WANG P P , FENG D G , ZHANG L W . CP-ABE scheme supporting fully fine-grained attribute revocation [J ] . Journal of Software , 2012 , 23 ( 10 ): 2805 - 2816 .
WU Q X . A generic construction of ciphertext-policy attribute-based encryption supporting attribute revocation [J ] . In:China communications , 2014 , 11 ( 1 ): 93 - 100 .
PIRRETTI M , TRAYNOR P , MCDANIEL P , et al . Secure attribute-based systems [A ] . Proc of the ACM Conf.on Computer and Communications Security [C ] . New York , 2006 . 99 - 111 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [A ] . Proc of the 2007 IEEE Symp on Security and Privacy [C ] . Washington,IEEE Computer Society , 2007 . 322 - 334 .
BOLDYREVA A , GOYAL V , KUMAR V . Identity-based encryption with efficient revocation [A ] . Proc of the ACM Conf on Computer and Communications Security [C ] . New York , 2008 . 417 - 426 .
IBRAIMI L , PETKOVIC M , NIKOYA S , et al . Mediated ciphertext-policy attribute-based encryption and its application [A ] . Proc of the 10th Int’l Workshop on Information Security Applications-WISA 2009 [C ] . LNCS 5932,Berlin,Heidelberg : Springer-Verlag , 2009 . 310 - 322 .
YU S C , WANG C , REN K , et al . Attribute based data sharing with attribute revocation [A ] . Proc of the ASIAN ACM Conf on Computer and Communications Security(ASIACCS 2010) [C ] . New York,ACM Press , 2010 . 262 - 270 .
CHENG Y , WANG Z Y , MA J , et al . Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage [J ] . Journal of Zhejiang University-Science C , 2013 , 14 ( 2 ): 85 - 97 .
HUR J , NOH D K . Attribute-based access control with efficient revocation in data outsourcing systems [J ] . IEEE Transactions on Parallel and Distributed Systems , 2011 , 22 ( 7 ): 1214 - 1221 .
XIE X X , MA H , LI J , et al . An efficient ciphertext-policy attribute-based access control towards revocation in cloud computing [J ] . Journal of Universal Computer Science , 2013 ,( 16 ): 2349 - 2367 .
TAKERU N , MASAMI M , YOSHIAKI S . Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating [J ] . Human-Centric Computing and Information Sciences , 2015 ,( 8 ): 1 - 13 .
IBRAIMI L , TANG Q , HARTEL P , et al . Efficient and provable secure ciphertext-policy attribute-based encryption schemes [A ] . Proc of the Information Security Practice and Experience [C ] . Berlin,Heidelberg : Springer-Verlag , 2009 . 1 - 12 .