期刊文献+

Fully Secure Revocable Attribute-Based Encryption 被引量:3

Fully Secure Revocable Attribute-Based Encryption
原文传递
导出
摘要 Distributed information systems require complex access control which depends upon attributes of protected data and access policies.Traditionally,to enforce the access control,a file server is used to store all data and act as a reference to check the user.Apparently,the drawback of this system is that the security is based on the file server and the data are stored in plaintext.Attribute-based encryption(ABE) is introduced first by Sahai and Waters and can enable an access control mechanism over encrypted data by specifying the users’ attributes. According to this mechanism,even though the file server is compromised,we can still keep the security of the data. Besides the access control,user may be deprived of the ability in some situation,for example paying TV.More previous ABE constructions are proven secure in the selective model of security that attacker must announce the target he intends to attack before seeing the public parameters.And few of previous ABE constructions realize revocation of the users’ key.This paper presents an ABE scheme that supports revocation and has full security in adaptive model.We adapt the dual system encryption technique recently introduced by Waters to ABE to realize full security. Distributed information systems require complex access control which depends upon attributes of protected data and access policies. Traditionally, to enforce the access control, a file server is used to store all data and act as a reference to check the user. Apparently, the drawback of this system is that the security is based on the file server and the data are stored in plaintext. Attribute-based encryption (ABE) is introduced first by Sahai and Waters and can enable an access control mechanism over encrypted data by specifying the users' attributes. According to this mechanism, even though the file server is compromised, we can still keep the security of the data. Besides the access control, user may be deprived of the ability in some situation, for example paying TV. More previous ABE constructions are proven secure in the selective model of security that attacker must announce the target he intends to attack before seeing the public parameters. And few of previous ABE constructions realize revocation of the users' key. This paper presents an ABE scheme that supports revocation and has full security in adaptive model. We adapt the dual system encryption technique recently introduced by Waters to ABE to realize full security.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第4期490-496,共7页 上海交通大学学报(英文版)
基金 the National Natural Science Foundation of China(No.60972034)
关键词 attribute-based encryption(ABE) dual encryption REVOCATION attribute-based encryption (ABE), dual encryption, revocation
  • 相关文献

参考文献13

  • 1梁希泉,王联群.CONTACT黎曼流形上S.TANNO联络的数量曲率[J].东北师大学报(自然科学版),1990,22(1):33-38. 被引量:2
  • 2TANNO B. Variational Problem on Contact RiemannianManifolds [J]. Transactions of the American Mathematical society, 314( 1 ): 349 -380. 被引量:2
  • 3BETHENCOURT J, SAHAI A, WATERS B. Ciphertextpolicy attribute-based encryption [C]// IEEE Symposium on Security and Privacy. Washington: IEEE Computer Society, 2007: 321-334. 被引量:1
  • 4OSTROVSKY R, SAHAI A, WATERS B. Attribute based encryption with non-monotonic access structures [C]// Proceedings of the l~th A CM Conference on Computer and Communications Security. New York: ACM, 2007: 195-203. 被引量:1
  • 5WATERS B. Ciphertext-policy attribute-based encryp- tion: An expressive, efficient, and provably secure realization [C]// l~th International Conference on Practice and Theory in Public Key Cryptography. Taormina, Italy: Springer-Verlag, 2011: 53-70. 被引量:1
  • 6BONEH D, FRANKLIN M. Identity based encryption from the weil pairing [C]// Proceedings of the 21st An- nual International Cryptology Conference on Advances in Cryptology. London: Springer-Verlag, 2001: 213- 229. 被引量:1
  • 7BOLDYREVA A, GOYAL V, KUMAR V. Identity-based encryption with efficient revocation [C]//Proceedings of the 15th ACM Conference on Computer and Com- munications Security. New York: ACM, 2008: 417-426. 被引量:1
  • 8WATERS B. Dual system encryption: realizing fully se- cure ibe and hibe under simple assumptions [C]//29th Annual International Cryptology Conference. Santa Barbara: Springer-Verlag, 2009: 619-636. 被引量:1
  • 9LEWKO A, WATERS B. New techniques for dual system encryption and fully secure hibe with short ciphertexts [C]// 7th Theory of Cryptography Conference. Zurich, Switzerland: Springer-Verlag, 2010: 455-479. 被引量:1
  • 10LEWKO A, OKAMOTO T, SAHAI A, et al. Fully se- cure functional encryption: Attribute-based encryp- tion and (hierarchical) inner product encryption [C]// 29th Annual International Conference on the Theory and Applications of Cryptographie Techniques. French Riviera: Springer-Verlag, 2010: 62-91. 被引量:1

共引文献1

同被引文献36

引证文献3

二级引证文献53

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部