Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage

被引:17
作者
Ming, Yang [1 ]
He, Baokang [1 ]
Wang, Chenhao [1 ]
机构
[1] Changan Univ, Sch Informat Engn, Xian 710064, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption; Cloud computing; Outsourcing; Elliptic curve cryptography; Distributed databases; Access control; Public key; Attribute-based encryption; multi-authority; revocation; elliptic curve cryptography; cloud storage; DATA ACCESS-CONTROL; SECURE; REVOCATION;
D O I
10.1109/ACCESS.2021.3066212
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As is known, attribute-based encryption (ABE) is usually adopted for cloud storage, both for its achievement of fine-grained access control over data, and for its guarantee of data confidentiality. Nevertheless, single-authority attribute-based encryption (SA-ABE) has its obvious drawback in that only one attribute authority can assign the users' attributes, enabling the data to be shared only within the management domain of the attribute authority, while rendering multiple attribute authorities unable to share the data. On the other hand, multi-authority attribute-based encryption (MA-ABE) has its advantages over SA-ABE. It can not only satisfy the need for the fine-grained access control and confidentiality of data, but also make the data shared among different multiple attribute authorities. However, existing MA-ABE schemes are unsuitable for the devices with resources-constraint, because these schemes are all based on expensive bilinear pairing. Moreover, the major challenge of MA-ABE scheme is attribute revocation. So far, many solutions in this respect are not efficient enough. In this paper, on the basis of the elliptic curves cryptography, we propose an efficient revocable multi-authority attribute-based encryption (RMA-ABE) scheme for cloud storage. The security analysis indicates that the proposed scheme satisfies indistinguishable under adaptive chosen plaintext attack assuming hardness of the decisional Diffie-Hellman problem. Compared with the other schemes, the proposed scheme gets its advantages in that it is more economical in computation and storage.
引用
收藏
页码:42593 / 42603
页数:11
相关论文
共 28 条
[1]  
Beimel A., 1996, Secure schemes for secret sharing and key distribution
[2]   PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT [J].
Belguith, Sana ;
Kaaniche, Nesrine ;
Laurent, Maryline ;
Jemai, Abderrazak ;
Attia, Rabah .
COMPUTER NETWORKS, 2018, 133 :141-156
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[5]  
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
[6]   A Novel Efficient Pairing-Free CP-ABE Based on Elliptic Curve Cryptography for IoT [J].
Ding, Sheng ;
Li, Chen ;
Li, Hui .
IEEE ACCESS, 2018, 6 :27336-27345
[7]   A secure and efficient outsourced computation on data sharing scheme for privacy computing [J].
Fan, Kai ;
Liu, Tingting ;
Zhang, Kuan ;
Li, Hui ;
Yang, Yintang .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 135 :169-176
[8]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[9]   Decentralizing Attribute-Based Encryption [J].
Lewko, Allison ;
Waters, Brent .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 :568-588
[10]   User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage [J].
Li, Jiguo ;
Yao, Wei ;
Han, Jinguang ;
Zhang, Yichen ;
Shen, Jian .
IEEE SYSTEMS JOURNAL, 2018, 12 (02) :1767-1777