PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system

被引:22
作者
Zhang, Wei [1 ]
Zhang, Zhishuo [1 ]
Xiong, Hu [1 ]
Qin, Zhiguang [1 ]
机构
[1] Univ Elect Sci & Technol China UESTC, Network & Data Secur Key Lab Sichuan Prov, Jianshe North Rd, Chengdu, Peoples R China
关键词
Ciphertext-policy ABE (CP-ABE); Large universe; Highly efficient key revocation (HEKR); Partially hidden access structure (PHAS); Linear secret sharing scheme (LSSS); ATTRIBUTE-BASED ENCRYPTION; PROXY RE-ENCRYPTION; ACCESS-CONTROL; SECURE;
D O I
10.1007/s12652-021-02922-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, attribute-based encryption (ABE) provides a new idea to help researchers solving the problem of data privacy protection in cloud. But there are two issues in traditional ABE, the first issue is that the attributes in the access structures will be sent to users in cleartext together with the ciphertext. So a attacker has the opportunity to obtain some of the private information from the plaintext access structure. And the other issue is the traditional ABE scheme cannot revoke the users' illegal keys in an efficient way. To handle both of the above challenges, we come up with a large universe ciphertext-policy ABE (CP-ABE) scheme which supports partially hidden access structures (PHAS) and highly efficient key revocation at the same time in this paper. What's more, unlike most previous schemes, first our access structure is based on the expressive linear secret sharing scheme (LSSS) which supports both AND and OR gates in access formulas and second our scheme is built from the prime-order bilinear pairing groups. The comparison with other relevant works presents that our scheme is more comprehensive and efficient. Finally we rigorously prove and analyze that our scheme is selectively indistinguishable secure under chosen plaintext attacks (IND-CPA) in the random oracle model (ROM) and our access structure is really anonymous against off-line dictionary attacks.
引用
收藏
页码:613 / 627
页数:15
相关论文
共 52 条
[1]  
[Anonymous], 2006, The pairing-based cryptography library
[2]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[3]  
Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6
[4]  
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5671, P248, DOI 10.1007/978-3-642-03298-1_16
[5]  
Beimel A., 1996, SECURE SCHEMES SECRE
[6]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[7]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[8]   An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures [J].
Cui, Hui ;
Deng, Robert H. ;
Wu, Guowei ;
Lai, Junzuo .
PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 :19-38
[9]   Flexible attribute-based proxy re-encryption for efficient data sharing [J].
Deng, Hua ;
Qin, Zheng ;
Wu, Qianhong ;
Guan, Zhenyu ;
Zhou, Yunya .
INFORMATION SCIENCES, 2020, 511 :94-113
[10]  
Freeman DM, 2010, LECT NOTES COMPUT SC, V6110, P44