Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage

被引:6
作者
Nomura, Kenta [1 ]
Mohri, Masami [2 ]
Shiraishi, Yoshiaki [1 ]
Morii, Masakatu [1 ]
机构
[1] Kobe Univ, Dept Elect Elect Engn, Kobe, Hyogo 6578501, Japan
[2] Gifu Univ, Informat & Multimedia Ctr, Gifu 5011193, Japan
关键词
ciphertext-policy attribute-based encryption; multiple key authorities; attribute revocation; forward secrecy; DATA ACCESS-CONTROL; BIG DATA; EFFICIENT;
D O I
10.1587/transinf.2016OFP0004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) has been widely applied in various fields. IoT data can also be put to cloud, but there are still concerns regarding security and privacy. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is attracted attention in cloud storage as a suitable encryption scheme for confidential data share and transmission. In CP-ABE, the secret key of a user is associated with a set of attributes; when attributes satisfy the access structure, the ciphertext is able to be decrypted. It is necessary that multiple authorities issue and manage secret keys independently. Authorities that generate the secret key can be regarded as managing the attributes of a user in CP-ABE. CP-ABE schemes that have multiple authorities have been proposed. The other hand, it should consider that a user's operation at the terminals is not necessary when a user drop an attribute and key is updated and the design of the communication system is a simple. In this paper, we propose CP-ABE scheme that have multiple key authorities and can revoke attribute immediately with no updating user's secret key for attribute revocation. In addition, the length of ciphertext is fixed. The proposed scheme is IND-CPA secure in DBDH assumption under the standard model. We compare the proposed scheme and the other CP-ABE schemes and show that the proposed scheme is more suitable for cloud storage.
引用
收藏
页码:2420 / 2431
页数:12
相关论文
共 50 条
  • [21] Attribute-based encryption scheme supporting decryption outsourcing and attribute revocation in cloud storage
    Liu, Hongwei
    Zhu, Ping
    Chen, Zehong
    Zhang, Peng
    Jiang, Zoe L.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 556 - 561
  • [22] Robust, revocable, forward and backward adaptively secure attribute-based encryption with outsourced decryption
    Bkakria, Anis
    JOURNAL OF COMPUTER SECURITY, 2023, 31 (06) : 727 - 760
  • [23] New directly revocable attribute-based encryption scheme and its application in cloud storage environment
    Wang, Hao
    Zheng, Zhihua
    Wu, Lei
    Li, Ping
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2385 - 2392
  • [24] Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation
    Zhang, Xiao
    Wu, Faguo
    Yao, Wang
    Wang, Zhao
    Wang, Wenhua
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (21)
  • [25] Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
    Sun L.
    Zhao Z.
    Wang J.
    Zhu Z.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (05): : 47 - 56
  • [26] Privacy-Preserving Traceable Attribute-Based Keyword Search in Multi-Authority Medical Cloud
    Huang, Qinlong
    Yan, Guanyu
    Yang, Yixian
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 678 - 691
  • [27] Attribute-Based Access Control for Multi-Authority Systems with Constant Size Ciphertext in Cloud Computing
    Chen Yanli
    Song Lingling
    Yang Geng
    CHINA COMMUNICATIONS, 2016, 13 (02) : 146 - 162
  • [28] Revocable attribute-based encryption from standard lattices
    Luo, Fucai
    Al-Kuwari, Saif
    Wang, Haiyan
    Wang, Fuqun
    Chen, Kefei
    COMPUTER STANDARDS & INTERFACES, 2023, 84
  • [29] Attribute-Based Access Control for Multi-Authority Systems with Constant Size Ciphertext in Cloud Computing
    CHEN Yanli
    SONG Lingling
    YANG Geng
    China Communications, 2016, 13 (02) : 146 - 162
  • [30] Blockchain-Based Multi-Authority Ciphertext-Policy Attribute-Based Encryption Scheme with Equality Test
    Yang X.-D.
    Chen A.-J.
    Wang Z.-S.
    Liao Z.-F.
    Wang C.-F.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2024, 52 (03): : 898 - 908