Revocable Key-Aggregate Cryptosystem for Data Sharing in Cloud

被引:4
作者
Gan, Qingqing [1 ]
Wang, Xiaoming [1 ]
Wu, Daini [1 ]
机构
[1] Jinan Univ, Dept Comp Sci, Guangzhou 510632, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
ENCRYPTION;
D O I
10.1155/2017/2508693
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of network and storage technology, cloud storage has become a new service mode, while data sharing and user revocation are important functions in the cloud storage. Therefore, according to the characteristics of cloud storage, a revocable key-aggregate encryption scheme is put forward based on subset-cover framework. The proposed scheme not only has the key-aggregate characteristics, which greatly simplifies the user's key management, but also can revoke user access permissions, realizing the flexible and effective access control. When user revocation occurs, it allows cloud server to update the ciphertext so that revoked users can not have access to the new ciphertext, while nonrevoked users do not need to update their private keys. In addition, a verification mechanism is provided in the proposed scheme, which can verify the updated ciphertext and ensure that the user revocation is performed correctly. Compared with the existing schemes, this scheme can not only reduce the cost of key management and storage, but also realize user revocation and achieve user's access control efficiently. Finally, the proposed scheme can be proved to be selective chosen-plaintext security in the standard model.
引用
收藏
页码:1 / 11
页数:11
相关论文
共 31 条
[1]   CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY [J].
AKL, SG ;
TAYLOR, PD .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03) :239-248
[2]  
Alomair B, 2009, J UNIVERS COMPUT SCI, V15, P2937
[3]  
[Anonymous], TECH REP
[4]   Dynamic and Efficient Key Management for Access Hierarchies [J].
Atallah, Mikhail J. ;
Blanton, Marina ;
Fazio, Nelly ;
Frikken, Keith B. .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 12 (03)
[5]   Provably-Secure Time-Bound Hierarchical Key Assignment Schemes [J].
Ateniese, Giuseppe ;
De Santis, Alfredo ;
Ferrara, Anna Lisa ;
Masucci, Barbara .
JOURNAL OF CRYPTOLOGY, 2012, 25 (02) :243-270
[6]  
Benaloh Josh., 2009, P 2009 ACM WORKSHOP, P103, DOI DOI 10.1145/1655008.1655024
[7]  
Boneh D., 2003, Contemporary Mathematics, P71, DOI DOI 10.1090/CONM/324/05731
[8]  
Boneh D., 2001, LECT NOTES COMPUTER, V44, P389
[9]  
Boneh D, 2014, LECT NOTES COMPUT SC, V8616, P206, DOI 10.1007/978-3-662-44371-2_12
[10]   Chosen-ciphertext security from identity-based encryption [J].
Canetti, R ;
Halevi, S ;
Katz, J .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 :207-222