Improving File Hierarchy Attribute-Based Encryption Scheme with Multi-authority in Cloud

被引:0
作者
Kang, Li [1 ]
Zhang, Leyou [1 ]
机构
[1] Xidian Univ, Sch Math & Stat, Xian 710126, Peoples R China
来源
FRONTIERS IN CYBER SECURITY, FCS 2019 | 2019年 / 1105卷
关键词
File hierarchy; Attribute-based encryption; Multi-authority; Cloud computing;
D O I
10.1007/978-981-15-0818-9_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of cloud computing technology, users tend to store their data remotely in the cloud to save storage space and enjoy scalable services. However, the cloud servers are not entirely trusted. Ciphertext-policy attribute-based encryption (CP-ABE) is considered as an effective cryptographic approach to prevent the untrusted cloud severs from leaking private data. Since in some areas such as medical and business, the shared data has the feature of multi-level hierarchy, so it makes sense to construct a hierarchy ABE scheme. Recently, Guo et al. proposed a PHR hierarchy multi-authority CP-ABE scheme, which implements global identifier (GID) hiding and hierarchical access control. Unfortunately, we find that the recursive operation (DecryptNode(CT, SK, (x, y))) defined in their scheme during the decryption phase is doubtable. Based on the analysis, we propose an improving file hierarchy MA-ABE scheme. The scheme preserves the security and privacy of the original scheme but reduces the user's decryption overhead. In addition, we solve the shortcoming which exists in Guo's scheme and the other corresponding schemes.
引用
收藏
页码:3 / 18
页数:16
相关论文
共 23 条
  • [1] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [2] Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
  • [3] Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
  • [4] Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme
    Ge, Aijun
    Zhang, Jiang
    Zhang, Rui
    Ma, Chuangui
    Zhang, Zhenfeng
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (11) : 2319 - 2321
  • [5] Hierarchical ID-based cryptography
    Gentry, C
    Silverberg, A
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 548 - 566
  • [6] Goyal V, 2006, P 13 ACM C COMP SEC, P89, DOI DOI 10.1145/1180405.1180418
  • [7] Guo R., 2018, J SUPERCOMPUT, P1
  • [8] Han JG, 2014, LECT NOTES COMPUT SC, V8713, P73, DOI 10.1007/978-3-319-11212-1_5
  • [9] Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (11) : 2150 - 2162
  • [10] Huiling Qian, 2013, Information and Communications Security. 15th International Conference, ICICS 2013. Proceedings: LNCS 8233, P363, DOI 10.1007/978-3-319-02726-5_26