Attribute-based encryption with location verification and policy adjusting supporting the cloud mobile office

被引:0
|
作者
Ying Z. [1 ]
Ma J. [1 ]
Cui J. [1 ]
机构
[1] School of Computer Science and Technology, Xidian Univ., Xi'an
来源
| 2017年 / Science Press卷 / 44期
关键词
BGV homomorphic encryption; Ciphertext-policy attribute-based encryption; Location verification; Policy adjusting;
D O I
10.3969/j.issn.1001-2400.2017.02.011
中图分类号
学科分类号
摘要
Facing the problems of the users' location privacy leakage and the indirect adjusting policies of the ciphertext stored in the cloud, in a mobile officie environment with cloud, a Ciphertext-Policy Attribute-Based Encryption with the Location Verification and Policy Adjusting (LVPA-CP-ABE) scheme is proposed. In the scheme, we apply BGV (Brakerski-Gentry-Vaikuntanathan) homomorphic encryption to protect the users' location privacy and updating key generated by the data owner directly to adjust the policy of the ciphertext stored in the cloud in the meantime. Moreover, in consideration of the endurance of mobile devices, the idea of outsourcing the BGV computation and BGV decryption as well as the ciphertext adjusting part is also introduced. The simulation indicates that our scheme is highly efficient in terms of users' computational cost. © 2017, The Editorial Board of Journal of Xidian University. All right reserved.
引用
收藏
页码:57 / 62and190
相关论文
共 11 条
  • [1] Yang Y., Liu J.K., Liang K., Et al., Extended Proxy-assisted Approach: Achieving Revocable Fine-grained Encryption of Cloud Data, Lecture Notes in Computer Science, 9327, pp. 146-166, (2015)
  • [2] Sahai A., Waters B., Fuzzy Identity-based Encryption, Lecture Notes in Computer Science, 3494, pp. 457-473, (2005)
  • [3] Goyal V., Pandey O., Sahai A., Et al., Attribute-based Encryption for Fine-grained Access Control of Encrypted Data, Proceedings of the ACM Conference on Computer and Communications Security, pp. 89-98, (2006)
  • [4] Bethencourt J., Sahai A., Waters B., Ciphertext-policy Attribute-based Encryption, Proceedings of the IEEE Symposium on Security and Privacy, pp. 321-334, (2007)
  • [5] Waters B., Ciphertext-policy Attribute-based Encryption: an Expressive, Efficient, and Provably Secure Realization, Lecture Notes in Computer Science, 6571, pp. 53-70, (2011)
  • [6] Yang K., Jia X., Ren K., Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud, IEEE Transactions on Parallel & Distributed Systems, 26, 12, pp. 3461-3470, (2015)
  • [7] Ying Z., Ma J., Cui J., Partially Policy Hidden CP-ABE Supporting Dynamic Policy Updating, Journal on Communications, 36, 12, pp. 178-189, (2015)
  • [8] Gentry C., Fully Homomorphic Encryption Using Ideal Lattices, Proceedings of the Annual ACM Symposium on Theory of Computing, pp. 169-178, (2009)
  • [9] Brakerski Z., Gentry C., Vaikuntanathan V., (Leveled) Fully Homomorphic Encryption without Bootstrapping, ACM Transactions on Computation Theory, 6, 3, (2014)
  • [10] Halevi S., Shoup V., Design and Implementation of a Homomorphic-encryption Library