Make Revocation Cheaper: Hardware-Based Revocable Attribute-Based Encryption

被引:2
|
作者
Li, Xiaoguo [1 ]
Yang, Guomin [1 ]
Xiang, Tao [2 ]
Xu, Shengmin [3 ]
Zhao, Bowen [4 ]
Pang, HweeHwa [1 ]
Deng, Robert H. [1 ]
机构
[1] Singapore Management Univ, Singapore, Singapore
[2] Chongqing Univ, Chongqing, Peoples R China
[3] Fujian Normal Univ, Fuzhou, Peoples R China
[4] Xidian Univ, Guangzhou Inst Technol, Guangzhou, Peoples R China
基金
国家重点研发计划; 新加坡国家研究基金会;
关键词
Attribute-based Encryption; Trusted Execution Environment; Data Sharing; Revocation;
D O I
10.1109/SP54263.2024.00100
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As an advanced one-to-many public key encryption system, attribute-based encryption (ABE) is widely believed to be a promising technology for achieving flexible and fine-grained access control of encrypted data on untrusted storage servers (e.g., public cloud servers). However, user revocation in ABE is a critical but challenging problem, and designing efficient revocable ABE has been an active research topic in the past decade. Almost all the existing revocable ABE schemes incorporate a timestamp in the encryption algorithm such that revoked users cannot decrypt ciphertexts generated in future time intervals. To prevent revoked users from decrypting past ciphertexts, the storage server needs to perform a process called ciphertext delegation (Sahai et al., CRYPTO'12) that periodically updates the timestamp for all ciphertexts. As the number of ciphertexts could be huge in a storage system, ciphertext delegation could pose a huge computation overhead to the server. Motivated by the popularity of commodity Trusted Execution Environment (TEE) technologies, this paper initiates the study on hardware-based revocable ABE (HR-ABE) to eliminate the (unscalable) ciphertext delegation and prevent collusion attacks between an untrusted storage server and revoked users. We formalize this new notion and present an efficient HR-ABE construction that also supports outsourced decryption for resource-constrained data users. Furthermore, HR-ABE is also designed to address the potential secret leakage problem suffered by TEE (e.g., due to side-channel attacks) so that the leakage of secrets possessed by TEE does not lead to leakage of user data. We prove HR-ABE's security formally and benchmark its performance experimentally.
引用
收藏
页码:3109 / 3127
页数:19
相关论文
共 50 条
  • [1] Revocable and Decentralized Attribute-Based Encryption
    Cui, Hui
    Deng, Robert H.
    COMPUTER JOURNAL, 2016, 59 (08): : 1220 - 1235
  • [2] Efficient revocable attribute-based encryption scheme
    Li X.
    Zhang D.
    Li H.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (06): : 32 - 39
  • [3] Fully secure revocable attribute-based encryption
    Qian J.-L.
    Dong X.-L.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (4) : 490 - 496
  • [4] Fully Secure Revocable Attribute-Based Encryption
    钱俊磊
    董晓蕾
    Journal of Shanghai Jiaotong University(Science), 2011, 16 (04) : 490 - 496
  • [5] Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation
    Gao J.
    Sun J.
    Qin J.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2160 - 2169
  • [6] Attribute-based Encryption with Flexible Revocation for IoV
    Chen, Ruoyu
    Li, Yuhong
    Rahmani, Rahim
    18TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS, FNC 2023/20TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING, MOBISPC 2023/13TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, SEIT 2023, 2023, 224 : 131 - 138
  • [7] Efficient Revocable Attribute-Based Encryption with Hidden Policies
    Ziegler, Dominik
    Marsalek, Alexander
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1638 - 1645
  • [8] Revocable Attribute-Based Encryption With Data Integrity in Clouds
    Ge, Chunpeng
    Susilo, Willy
    Baek, Joonsang
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 2864 - 2872
  • [9] Revocable attribute-based encryption from standard lattices
    Luo, Fucai
    Al-Kuwari, Saif
    Wang, Haiyan
    Wang, Fuqun
    Chen, Kefei
    COMPUTER STANDARDS & INTERFACES, 2023, 84
  • [10] Adaptively Secure Attribute-Based Encryption Supporting Attribute Revocation
    Wu Qiuxin
    Zhang Miao
    CHINA COMMUNICATIONS, 2012, 9 (09) : 22 - 40