Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation

被引:65
作者
Xu, Shengmin [1 ]
Yang, Guomin [1 ]
Mu, Yi [2 ]
机构
[1] Univ Wollongong, Inst Cybersecur & Cryptol, Sch Comp & Informat Technol, Wollongong, NSW, Australia
[2] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Fujian, Peoples R China
基金
中国国家自然科学基金;
关键词
Access control; Attribute-based encryption; Revocable storage; Ecryption key exposure; REVOCATION;
D O I
10.1016/j.ins.2018.11.031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) enables fine-grained access control over encrypted data. A practical and popular approach for handing revocation in ABE is to use the indirect revocation mechanism, in which a key generation centre (KGC) periodically broadcasts key update information for all data users over a public channel. Unfortunately, existing RABE schemes are vulnerable to decryption key exposure attack which has been well studied in the identity-based setting. In this paper, we introduce a new notion for RABE called re-randomizable piecewise key generation by allowing a data user to re-randmomize the combined secret key and the key update to obtain the decryption key, and the secret key is unrecoverable even both the decryption key and the key update are known by the attacker. We then propose a new primitive called re-randomizable attribute-based encryption (RRABE) that can achieve both re-randomizable piecewise key generation and cipher text delegation. We also refine the existing security model for RABE to capture decryption key exposure resistance and present a generic construction of RABE from RRABE. Finally, by applying our generic transformation, we give a concrete RABE scheme achieving decryption key exposure resistance and ciphertext delegation simultaneously. (C) 2018 Elsevier Inc. All rights reserved.
引用
收藏
页码:116 / 134
页数:19
相关论文
共 37 条
[21]  
Micali S., 1996, MITLCSTM542B
[22]  
Naor D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P41
[23]   CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage [J].
Ning, Jianting ;
Cao, Zhenfu ;
Dong, Xiaolei ;
Liang, Kaitai ;
Wei, Lifei ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (01) :111-124
[24]   Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing [J].
Ning, Jianting ;
Cao, Zhenfu ;
Dong, Xiaolei ;
Liang, Kaitai ;
Ma, Hui ;
Wei, Lifei .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (01) :94-105
[25]  
Nissim K., 1998, CERTIFICATE REVOCATI
[26]  
Pirretti Matthew, 2006, P 13 ACM C COMP COMM, P99
[27]   Server-Aided Revocable Identity-Based Encryption [J].
Qin, Baodong ;
Deng, Robert H. ;
Li, Yingjiu ;
Liu, Shengli .
COMPUTER SECURITY - ESORICS 2015, PT I, 2015, 9326 :286-304
[28]  
Rouselakis Y., 2013, P 2013 ACM SIGSAC C, P463, DOI DOI 10.1145/2508859.2516672
[29]   Fuzzy identity-based encryption [J].
Sahai, A ;
Waters, B .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :457-473
[30]  
Sahai A, 2012, LECT NOTES COMPUT SC, V7417, P199