Ciphertext-policy attribute-based encryption scheme with verifiability on authority

被引:0
|
作者
Yu J. [1 ]
He X. [1 ]
Yan X. [1 ]
机构
[1] School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo
关键词
Attribute-based encryption; Cloud environment; Ring signature; Verifiability on authority;
D O I
10.19665/j.issn1001-2400.2019.04.008
中图分类号
学科分类号
摘要
To address the problem of how to authenticate a valid authority in the real life, a new ciphertext-policy attribute-based encryption scheme with verifiability on authority is proposed. By employing ring signature technology, multiple authorities are organized into a valid organization, and the value of ring signature which can be used to prove the legitimacy of each authority is reasonably embedded in the user's private key, so that users are able to verify the validity of the authority. In addition, the linear secret sharing scheme is adopted to support any monotone access structures in our scheme, and it is proved to be full security based on the difficult assumptions on the composite order group under the standard model. Finally, compared with some related attribute-based encryption schemes, the proposed scheme has certain performance advantages in terms of ciphertext size, user's private key size, bilinear pairing calculation and so on. Therefore, it is more suitable for cloud environment and resource-limited mobile devices. © 2019, The Editorial Board of Journal of Xidian University. All right reserved.
引用
收藏
页码:49 / 57
页数:8
相关论文
共 21 条
  • [1] Sahai A., Waters B., Fuzzy Identity-based Encryption, Lecture Notes in Computer Science: 3494, pp. 457-473, (2005)
  • [2] Jiang Y., Susilo W., Mu Y., Et al., Ciphertext-policy Attribute-based Encryption against Key-delegation Abuse in Fog Computing, Future Generation Computer Systems, 78, pp. 720-729, (2018)
  • [3] Qiao H., Ren J., Wang Z., Et al., Compulsory Traceable Ciphertext-policy Attribute-based Encryption against Privilege Abuse in Fog Computing, Future Generation Computer Systems, 88, pp. 107-116, (2018)
  • [4] Chase M., Multi-authority Attribute Based Encryption, Lecture Notes in Computer Science: 4392, pp. 515-534, (2007)
  • [5] Lewko A., Waters B., Decentralizing Attribute-based Encryption, Lecture Notes in Computer Science: 6632, pp. 568-588, (2011)
  • [6] Zhong H., Cui J., Zhu W., Et al., Efficient and Verifiable Multi-authority Attribute Based Encryption Scheme, Journal of Software, 29, 7, pp. 2006-2017, (2018)
  • [7] Xu Q., Tan C., Fan Z., Et al., Secure Data Access Control for Fog Computing Based on Multi-authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation, Sensors, 18, 5, (2018)
  • [8] Yan X., Liu Y., Hu M., Et al., LWE-based Multi-authority Attribute-based Encryption Scheme in Cloud Environment, Netinfo Security, 9, pp. 128-133, (2017)
  • [9] Yan X., Liu Y., Li Z., Et al., Multi-authority Attribute-based Encryption Scheme with Policy Semi-hidden and Dynamic Updating, Journal of Xidian University, 45, 2, pp. 122-128, (2018)
  • [10] Zhang K., Li H., Ma J., Et al., Efficient Large-Universe Multi-authority Ciphertext-policy Attribute-based Encryption with White-box Traceability, Science China Information Sciences, 61, 3, (2018)