Ciphertext policy attribute-based encryption scheme supporting direct revocation
Papers|更新时间:2024-06-05
|
Ciphertext policy attribute-based encryption scheme supporting direct revocation
Journal on CommunicationsVol. 37, Issue 5, Pages: 44-50(2016)
作者机构:
河南理工大学计算机科学与技术学院,河南 焦作454003
作者简介:
基金信息:
The National Natural Science Foundation of China(61300216);The Science and Technology Project of Henan Province(132102210123);Project of Science and Technology Depart-ment of Henan Province(152102410048);Foundation of Henan Educational Committee(12A520021);Foundation of Henan Educational Committee(16A520013);Research Fund for the Doctoral Program of Henan Polytechnic University(B2013-043)
In order to support fine-grained attribute revocation in direct revocation mode an attribute-based encryption scheme with efficient revocation was proposed.The model of ABE supporting attribute revocation was given
and a con-crete scheme was constructed which was proven its security under the standard model.Compared to the existing related schemes
the size of ciphertext and private/secret key was reduced.In additional
the new scheme achieved fine-grained and immediate attribute revocation which is more suitable for the practical applications.
关键词
Keywords
references
SAHAI A , WATERS B . Fuzzy identity-based encryption [C ] // Ad-vances in Cryptology -EUROCRYPT 2005 . Berlin c2005 : 457 - 473 .
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [C ] // The 13th ACM Conference on Computer and Communications Security . New York , c2006 : 89 - 98 .
PIRRETTI M , TRAYNOR P , MCDANIEL P , et al . Secure attribute-based systems [C ] // The ACM Conf on Computer and Com-munications Security . New York , c2006 : 99 - 111 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [C ] // The 2007 IEEE Symp on Security and Privacy . Washington c2007 : 322 - 334 .
BOLDYREVA A , GOYAL V , KUMAR V . Identity-based encryption with efficient revocation [C ] // The ACM Conf on Computer and Com-munications Security . New York , c2008 : 417 - 426 .
IBRAIMI L , PETKOVIC M , NIKOYA S , et al . Mediated cipher-text-policy attribute-based encryption and its application [C ] // The 10th Int'l Workshop on Information Security Applications-WISA . Berlin , c2009 : 310 - 322 .
YU S C , WANG C , REN K , et al . Attribute based data sharing with attribute revocation [C ] // The ASIAN ACM Conf on Computer and Com-munications Security(ASIACCS 2010) . New York , c2010 : 262 - 270 .
CHENG Y , WANG Z Y , MA J , et al . Efficient revocation i cipher-text-policy attribute-based encryption based cryptographic cloud sto-rage [J ] . Journal of Zhejiang University-Science , 2013 , 14 ( 2 ): 85 - 97 .
HUR J , NOH D K . Attribute-based access control with efficient revo-cation in data outsourcing systems [J ] . IEEE Transactions on Parallel and Distributed Systems , 2011 , 122 ( 7 ): 1214 - 1221 .
XIE X X , MA H , LI J , et al . An efficient ciphertext-policy attribute-based access control towards revocation in cloud computing [J ] . Journal of Universal Computer Science , 2013 , 119 ( 16 ): 2349 - 2367 .
OSTROVSKY R , SAHAI A , WATERS B . Attribute-based encryption with non-monotonic access structures [C ] // The ACM Conf on Com-puter and Communications Security . New York , c2007 : 195 - 203 .
ATTAPADUNG N , IMAI H . Conjunctive broadcast and attribute-based encryption [C ] // The Pairing-Based Cryptography-Pairing 2009 . Berlin c20079 : 248 - 265 .
WANG P P , FENG D G , ZHANG L W . CP-ABE scheme supporting fully fine-grained attribute revocation [J ] . Journal of Software , 2012 , 23 ( 10 ): 2805 - 2816 .
WU Q X . A generic construction of ciphertext-policy attribute-based encryption supporting attribute revocation [J ] . China Communica-tions , 2014 , 111 ( 1 ): 93 - 100 .
LIU Z , CAO Z F . On efficiently transferring the linear secret-sharing schemes matrix in ciphertext-policy attribute-based encryption [EB/OL ] . http://eprint.iacr.org/2010/374.pdf http://eprint.iacr.org/2010/374.pdf , 2010 .
LIU Z , CAO Z F . Efficient generation of linear secret haring scheme matrices from threshold access trees [C ] // Cryptology ePrint Archive:Listing . c2010 .
LEWKO A , SAHAI A , WATERS B . Revocation systems with very small private keys [C ] // IEEE Symposium on Security and Privacy(SP) . Oakland,USA , c2010 : 273 - 285 .
IBRAIMI L , TANG Q , HARTEL P , et al . Efficient and provable secure ciphertext-policy attribute-based encryption schemes [C ] // The Infor-mation Security Practice and Experience . Berlin , c2009 : 1 - 12 .