Anonymous attribute-based proxy re-encryption for access control in cloud computing

被引:64
作者
Zhang, Yinghui [1 ,2 ]
Li, Jin [3 ]
Chen, Xiaofeng [2 ,4 ]
Li, Hui [4 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Guangzhou Univ, Sch Comp Sci & Educ Software, Guangzhou, Guangdong, Peoples R China
[4] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian, Peoples R China
基金
国家教育部博士点专项基金资助; 中国国家自然科学基金;
关键词
cloud computing; access control; attribute-based proxy re-encryption; anonymity; access policy update;
D O I
10.1002/sec.1509
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a public key cryptographic primitive, attribute-based encryption (ABE) is promising in implementing fine-grained access control in cloud computing. However, before ABE comes into practical applications, two challenging issues have to be addressed, that is, users' attribute privacy protection and access policy update. In this paper, we tackle the aforementioned challenge for the first time by formalizing the notion of anonymous ciphertext-policy attribute-based proxy re-encryption (anonymous CP-ABPRE) and giving out a concrete construction. We propose a novel technique called match-then-re-encrypt, in which a matching phase is additionally introduced before the re-encryption phase. This technique uses special components of the proxy re-encryption key and ciphertext to anonymously check whether the proxy can fulfill a proxy re-encryption or not. Theoretical analysis and simulation results demonstrate that our anonymous CP-ABPRE scheme is secure and efficient. Copyright (c) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:2397 / 2411
页数:15
相关论文
共 29 条
  • [1] [Anonymous], STANFORD PAIRING BAS
  • [2] [Anonymous], 2006, CCS 06
  • [3] Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
  • [4] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [5] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
  • [6] Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
  • [7] Canetti R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P185
  • [8] Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
  • [9] Garg S, 2013, LECT NOTES COMPUT SC, V8043, P479, DOI 10.1007/978-3-642-40084-1_27
  • [10] Goyal V, 2008, LECT NOTES COMPUT SC, V5126, P579, DOI 10.1007/978-3-540-70583-3_47