Revocable Attribute-based Encryption with Escrow-free in Cloud Storage

被引:3
|
作者
Zhao Zhiyuan [1 ]
Zhu Zhiqiang [1 ,2 ]
Wang Jianhua [1 ,3 ]
Sun Lei [1 ]
机构
[1] Informat Engn Univ, Coll 3, Zhengzhou 450001, Henan, Peoples R China
[2] Zhengzhou Xin Da Adv Technol Res Inst, Zhengzhou 450001, Henan, Peoples R China
[3] Elect Technol Inst Air Force, Beijing 100195, Peoples R China
关键词
Cloud storage; Attribute-Based Encryption (ABE); Escrow-free; Revocation; Outsourced decryption;
D O I
10.11999/JEIT170317
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Attribute-Based Encryption (ABE) scheme is widely used in cloud storage, which can achieve fine-grained access control. However, the original attribute-based encryption schemes have key escrow and attribute revocation problems. To solve these problems, this paper proposes a ciphertext-based ABE scheme. In the scheme, the key escrow problem could be solved by escrow-free key issuing protocol, which is constructed using the secure two-party computation between the attribute authority and the central controller. By updating the attribute version key, the scheme can achieve attribute-level user revocation. And by central controller, the scheme can achieve system-level user revocation. In order to reduce the user's computational burden of decryption, this scheme outsources the complicated pair operation to cloud service providers. Based on the assumption of q-Parallel BDHE, the scheme is proved that is the security of the chosen plaintext attack in the random oracle model. Finally, the efficiency and function of this scheme are analyzed theoretically and experimentally. The experimental results show that the proposed scheme does not have key escrow problem and has the higher system efficiency.
引用
收藏
页码:1 / 10
页数:10
相关论文
共 18 条
  • [1] BETHENCOURT J, 2011, ADV CRYPTO SOFTWARE
  • [2] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [3] Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
  • [4] EABDS: Attribute-Based Secure Data Sharing with Efficient Revocation in Cloud Computing
    Huang Qinlong
    Ma Zhaofeng
    Yang Yixian
    Fu Jingyi
    Niu Xinxin
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (04) : 862 - 868
  • [5] Improving Security and Efficiency in Attribute-Based Data Sharing
    Hur, Junbeom
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013, 25 (10) : 2271 - 2282
  • [6] Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems
    Hur, Junbeom
    Noh, Dong Kun
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (07) : 1214 - 1221
  • [7] Ibraimi L, 2009, LECT NOTES COMPUT SC, V5932, P309, DOI 10.1007/978-3-642-10838-9_23
  • [8] LIU C W, 2016, INT J NETWORK SECURI, V18, P900
  • [9] Lynn B., 2006, PAIRING BASED CRYPTO
  • [10] A network based document management model to prevent data extrusion
    Morovati, Kamran
    Kadam, Sanjay
    Ghorbani, Ali
    [J]. COMPUTERS & SECURITY, 2016, 59 : 71 - 91