Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating

被引:25
作者
Ying, Zuobin [1 ]
Li, Hui [1 ]
Ma, Jianfeng [1 ]
Zhang, Junwei [1 ]
Cui, Jiangtao [1 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
attribute-based encryption; ciphertext-policy; dynamic policy updating; adaptive secure; standard model; ACCESS-CONTROL; EFFICIENT;
D O I
10.1007/s11432-015-5428-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-Based Encryption (ABE) is a promising new cryptographic technique which guarantees fine-grained access control of outsourced encrypted data in the cloud. With the help of ABE, the majority of security issues in accessing cloud data can be solved. However, a key limitation remains, namely policy updating. Whenever the access policy is updated, a common approach is to have the data owner retrieve the data and re encrypt it with new policy, before sending the new ciphertext back to the cloud. This straight-forward approach will lead to heavy computation and communication overhead. Although a number of other approaches have been proposed in this regard, they suffer from two limitations; namely, supporting only limited update-policy types or having weak security models. In order to address these limitations, we propose a novel solution to the attribute-based encryption access control system by introducing a dynamic policy-updating technique which we call DPU-CP-ABE. The scheme is proved to be adaptively secure under the standard model and can support any type of policy updating. In addition, our scheme can significantly reduce the computation and communication costs of updating ciphertext.
引用
收藏
页数:16
相关论文
共 15 条
[1]  
Beimel A., 1996, Ph.D. dissertation
[2]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[3]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[4]   A DIGITAL SIGNATURE SCHEME SECURE AGAINST ADAPTIVE CHOSEN-MESSAGE ATTACKS [J].
GOLDWASSER, S ;
MICALI, S ;
RIVEST, RL .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :281-308
[5]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[6]   Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems [J].
Hur, Junbeom ;
Noh, Dong Kun .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (07) :1214-1221
[7]   Decentralizing Attribute-Based Encryption [J].
Lewko, Allison ;
Waters, Brent .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 :568-588
[8]   Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption [J].
Lewko, Allison ;
Okamoto, Tatsuaki ;
Sahai, Amit ;
Takashima, Katsuyuki ;
Waters, Brent .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 :62-+
[9]  
Liu Z, 2011, LECT NOTES COMPUT SC, V6879, P278, DOI 10.1007/978-3-642-23822-2_16
[10]   DACC: Distributed Access Control in Clouds [J].
Ruj, Sushmita ;
Nayak, Amiya ;
Stojmenovic, Ivan .
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, :91-98