Multi-authority attribute-based encryption with efficient revocation
Papers|更新时间:2024-06-05
|
Multi-authority attribute-based encryption with efficient revocation
Journal on CommunicationsVol. 38, Issue 3, Pages: 83-91(2017)
作者机构:
1. 西安电子科技大学通信工程学院,陕西 西安 710071
2. 西安电子科技大学网络与信息安全学院,陕西 西安 710071
3. 西安电子科技大学计算机学院,陕西 西安 710071
作者简介:
基金信息:
The National High Technology Research and Development Program (863 Program)(2015AA016007);The National Natural Science Foundation of China(U1405255);The National Natural Science Foundation of China(61472310);The National Natural Science Foundation of China(61602365)
Kai ZHANG, Jian-feng MA, Hui LI, et al. Multi-authority attribute-based encryption with efficient revocation[J]. Journal on Communications, 2017, 38(3): 83-91.
DOI:
Kai ZHANG, Jian-feng MA, Hui LI, et al. Multi-authority attribute-based encryption with efficient revocation[J]. Journal on Communications, 2017, 38(3): 83-91. DOI: 10.11959/j.issn.1000-436x.2017068.
Multi-authority attribute-based encryption with efficient revocation
Multi-authority attribute-based encryption was very suitable for data access control in a cloud storage environment.However
efficient user revocation in multi-authority attribute-based encryption remains a challenging problem that prevents it from practical applications.A multi-authority ciphertext-policy attribute-based encryption scheme with efficient revocation was proposed in prime order bilinear groups
and was further proved statically secure and revocable in the random oracle model.Extensive efficiency analysis results indicate that the proposed scheme significantly reduce the computation cost for the users.In addition
the proposed scheme supports large universe and any monotone access structures
which makes it more flexible for practical applications.
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [C ] // The 13th ACM Conference on Computer and Communications Security . Alexandria,VA,USA , 2006 : 89 - 98 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [C ] // The IEEE Symposium on Security and Privacy . Berkeley,CA,USA , 2007 : 321 - 334 .
YANG K , JIA X . Expressive,efficient and revocable data access control for multi-authority cloud storage [J ] . IEEE Transactions on Parallel and Distributed Systems , 2014 , 25 ( 7 ): 1735 - 1744 .
HUANG X , TAO Q , QIN B , et al . Multi-authority attribute based encryption scheme with revocation [C ] // The 24th International Conference on Computer Communication and Networks . IEEE , 2015 : 1 - 5 .
CUI H , DENG R H . Revocable and decentralized attribute-based encryption [J ] . The Computer Journal , 2016 :bxw007.
LEWKO A , WATERS B . Unbounded HIBE and attribute-based encryption [C ] // EUROCRYPT . Springer Berlin Heidelberg , 2011 : 547 - 567 .
ROUSELAKIS Y , WATERS B . Efficient statically-secure largeuniverse multi-authority attribute-based encryption [C ] // Financial Cryptography and Data Security . Berlin:Springer , 2015 : 315 - 332 .
ZHANG K , MA J , LIU J , et al . Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption [J ] .,2016,59(9):99105. Science China Information Sciences , 2016 , 59 ( 9 ):99105.
ATTRAPADUNG N , IMAI H . Attribute-based encryption supporting direct/indirect revocation modes [C ] // IMA International Conference on Cryptography and Coding.Springer Berlin Heidelberg . 2009 : 278 - 300 .
SAHAI A , SEYALIOGLU H , WATERS B . Dynamic credentials and ciphertext delegation for attribute-based encryption [C ] // Crypto . Springer Berlin Heidelberg , 2012 : 199 - 217 .
YANG Y , DING X , LU H , et al . Achieving revocable fine-grained cryptographic access control over cloud data [C ] // Information Security . Springer International Publishing , 2015 : 293 - 308 .
YANG Y , LIU J K , LIANG K , et al . Extended proxy-assisted approach:achieving revocable fine-grained encryption of cloud data [C ] // European Symposium on Research in Computer Security . Springer International Publishing , 2015 : 146 - 166 .
YAN X X , MENG H . Ciphertext policy attribute-based encryption scheme supporting direct revocation [J ] . Journal on Communications , 2016 , 37 ( 5 ): 44 - 50 .
BEIMEL A . Secure schemes for secret sharing and key distribution [D ] . Technical-Israel Institute of Technology,Faculty of Computer Science , 1996 .
GREEN M , HOHENBERGER S , WATERS B . Outsourcing the decryption of ABE ciphertexts [C ] // The 20th USENIX Security Symposium . San Francisco , 2011 : 523 - 538 .