Efficient revocable attribute-based encryption scheme

被引:0
|
作者
Li X. [1 ]
Zhang D. [1 ]
Li H. [1 ]
机构
[1] School of Cyber Engineering, Xidian University, Xi'an
来源
Tongxin Xuebao/Journal on Communications | 2019年 / 40卷 / 06期
基金
中国国家自然科学基金;
关键词
Attribute revocation; CP-ABE; Less computation; Multi-authority; RSA key management;
D O I
10.11959/j.issn.1000-436x.2019150
中图分类号
学科分类号
摘要
In the existing solutions, the time-based scheme is difficult to achieve immediate revocation, and the third-party-based scheme often requires re-encryption, which needs large amount of calculation and doesn't apply to massive data. To solve the problem, an efficient and immediate CP-ABE scheme was proposed to support user and attribute levels revocation. The scheme was based on the classic LSSS access structure, introducing RSA key management mechanism and attribute authentication. By means of a semi-trusted third party, the user could be authenticated before decryption. Compared with the existing revocation schemes, The proposed scheme didn't need the user to update the key or re-encrypt the ciphertext. The semi-trusted third party wasn't required to update the RSA attribute authentication key. The scheme greatly reduced the amount of computation and traffic caused by revocation, while ensuring anti-collusion attacks and forward and backward security. Finally, the security analysis and experimental simulation show that the scheme has higher revocation efficiency. © 2019, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:32 / 39
页数:7
相关论文
共 20 条
  • [1] Rivera D., Garcia A., Martin-Ruiz M.L., Et al., Secure communications and protected data for a Internet of things smart toyplatform, IEEE Internet of Things Journal, 6, 2, pp. 3785-3795, (2019)
  • [2] Sahaia, Waters B., Fuzzy identity-based encryption, Annual International Conference on Theory and Applications of Cryptographic Tchniques, pp. 457-473, (2005)
  • [3] Waters B., Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization, International Workshop on Public Key Cryptography, pp. 321-334, (2008)
  • [4] Bethencourt J., Sahai A., Waters B., Ciphertext-policy attribute-based encryption, IEEE Symposium on Security and Privacy, pp. 321-334, (2007)
  • [5] Luan I., Petkovic M., Nikova S., Et al., Mediated ciphertext-policy attribute-based encryption and its application, Information Security Applications, 10th International Workshop, pp. 309-323, (2009)
  • [6] Yu S., Wang C., Ren K., Et al., Attribute based data sharing with attribute revocation, TheInternational Symposium on ACM Symposium on Information, Computer and Communications Security, pp. 261-270, (2010)
  • [7] Wu X., Jiang R., Bhargava B., On the security of data access control for multiauthority cloud storage systems, IEEE Transactions on Services Computing, 10, 2, pp. 272-285, (2015)
  • [8] Fan K., Wang J., Wang X., Et al., Secure, efficient and revocable data sharing scheme for vehicular fogs, Peer-to-Peer Networking and Applications, 11, 4, pp. 766-777, (2018)
  • [9] Li J., Yao W., Zhang Y., Et al., Flexible and fine-grained attribute-based data storage in cloud computing, IEEE Transactions on Services Computing, 10, 5, pp. 785-796, (2016)
  • [10] Fan K., Wang J., Wang X., Et al., Proxy-assisted access control scheme of cloud data for smart cities, Personal & Ubiquitous Computing, 21, 5, pp. 937-947, (2017)