CP-ABE with Efficient Revocation Based on the KEK Tree in data Outsourcing System

被引:0
作者
Wang, Xi-kun [1 ]
Sun, Xin [1 ]
机构
[1] Shanghai Univ, Dept Automat, Shanghai 200444, Peoples R China
来源
2021 PROCEEDINGS OF THE 40TH CHINESE CONTROL CONFERENCE (CCC) | 2021年
关键词
CP-ABE; KEK; Attribute Revocation; Cloud Storage; ATTRIBUTE-BASED ENCRYPTION; GRAINED ACCESS-CONTROL;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
CP-ABE (ciphertext-policy attribute-based encryption) is a promising encryption scheme. In this paper, a highly expressive revocable scheme based on the key encryption keys (KEK) tree is proposed. In this method, the cloud server realizes the cancellation of attribute-level users and effectively reduces the computational burden of the data owner and attribute authority. This scheme embeds a unique random value associated with the user in the attribute group keys. The attribute group keys of each user are different, and it is impossible to initiate a collusion attack. Computing outsourcing makes most of the decryption work done by the cloud server, and the data user only need to perform an exponential operation; in terms of security, the security proof is completed under the standard model based on simple assumptions. Under the premise of ensuring security, the scheme in this paper has the functions of revocation and traceability, and the speed of decryption calculation is also improved.
引用
收藏
页码:8610 / 8615
页数:6
相关论文
共 16 条
[1]  
[Anonymous], 2010, P ACMCCS
[2]  
Bethencourt J, 2007, P IEEE S SEC PRIV OA, P456
[3]   Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems [J].
Hur, Junbeom ;
Noh, Dong Kun .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (07) :1214-1221
[4]  
Kamara S, 2010, LECT NOTES COMPUT SC, V6054, P136, DOI 10.1007/978-3-642-14992-4_13
[5]   Risk factors of COVID-19 mortality: a systematic review of current literature and lessons from recent retracted articles [J].
Lee, K. H. ;
Kim, J. S. ;
Hong, S. H. ;
Seong, D. ;
Choi, Y. R. ;
Ahn, Y. T. ;
Kim, K. S. ;
Kim, S. E. ;
Lee, S. ;
Sim, W. ;
Kim, D. ;
Jun, B. ;
Yang, J. W. ;
Yon, D. K. ;
Lee, S. W. ;
Kim, M. S. ;
Dragioti, E. ;
Li, H. ;
Jacob, L. ;
Koyanagi, A. ;
Abou Ghayda, R. ;
Shin, J., I ;
Smith, L. .
EUROPEAN REVIEW FOR MEDICAL AND PHARMACOLOGICAL SCIENCES, 2020, 24 (24) :13089-13097
[6]  
Li J, 2009, IACR CRYPTOLOGY PRIN
[7]   White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures [J].
Liu, Zhen ;
Cao, Zhenfu ;
Wong, Duncan S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (01) :76-88
[8]  
Poor H.V., 2013, An Introduction to Signal Detection and Estimation
[9]  
Praveen K., 2020, TRANSFORMING ORG, p213
[10]  
Sahai A, 2012, LECT NOTES COMPUT SC, V7417, P199