期刊文献+

Adaptively Secure Attribute-Based Encryption Supporting Attribute Revocation 被引量:2

Adaptively Secure Attribute-Based Encryption Supporting Attribute Revocation
下载PDF
导出
摘要 Attribute revocation is inevitable and al- so important for Attribute-Based Encryption (ABE) in practice. However, little attention has been paid to this issue, and it retrains one of the rmin obsta-cles for the application of ABE. Most of existing ABE schemes support attribute revocation work under indirect revocation model such that all the users' private keys will be affected when the revo-cation events occur. Though some ABE schemes have realized revocation under direct revocation model such that the revocation list is embedded in the ciphertext and none of the users' private keys will be affected by revocation, they mostly focused on the user revocation that revokes the user's whole attributes, or they can only be proven to be selectively secure. In this paper, we first define a model of adaptively secure ABE supporting the at- tribute revocation under direct revocation model. Then we propose a Key-Policy ABE (KP-ABE) scheme and a Ciphertext-Policy ABE (CP-ABE) scheme on composite order bilinear groups. Finally, we prove our schemes to be adaptively secure by employing the methodology of dual system eno cryption. Attribute revocation is inevitable and also important for Attribute-Based Encryption (ABE) in practice.However,little attention has been paid to this issue,and it remains one of the main obstacles for the application of ABE.Most of existing ABE schemes support attribute revocation work under indirect revocation model such that all the users' private keys will be affected when the revocation events occur.Though some ABE schemes have realized revocation under direct revocation model such that the revocation list is embedded in the ciphertext and none of the users' private keys will be affected by revocation,they mostly focused on the user revocation that revokes the user's whole attributes,or they can only be proven to be selectively secure.In this paper,we first define a model of adaptively secure ABE supporting the attribute revocation under direct revocation model.Then we propose a Key-Policy ABE (KP-ABE) scheme and a Ciphertext-Policy ABE (CP-ABE) scheme on composite order bilinear groups.Finally,we prove our schemes to be adaptively secure by employing the methodology of dual system encryption.
出处 《China Communications》 SCIE CSCD 2012年第9期22-40,共19页 中国通信(英文版)
关键词 ABE direct revocation model attributerevocation adaptive security dual system encryp-tion access structure 安全属性 加密技术 自适应 撤销 ABE 私人密钥 用户 工作时
  • 相关文献

参考文献27

  • 1GOYAL V, PANDEY O, SAHAI A, et al. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security: October 30-No- vember 3, 2006, Alexandria, VA, USA. ACM Press, 2006: 89- 98. 被引量:1
  • 2SAHAI A, WATERS B. Fuzzy Identity-Based Encryption [C]// Proceedings of the 24th Annual Intemational Conference on Theory and Applications of Cryptographic Techniques, LNCS, 2005, 3494: 457-473. 被引量:1
  • 3BONEH D, FRANKLIN M. Identity-Based Encryption from the Weil Pairing[J]. SIAM Journal on Computing, 2003, 32 (3): 586-615. 被引量:1
  • 4OSTROVSKY R, SAHAI A, WATERS B. Attnbute-Based Encryption with Non-Monotonic Access Structures [C]// Proceedings of the 14th ACM Conference on Computer and Communications Security: October 28-31, 2007, Whistler, Canada. ACM Press, 2007: 195-203. 被引量:1
  • 5BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-Policy Attribute-Based Encryption[C]//Proceedings of the 2007 IEEE Symposium on Security and Privacy: May 20-23, 2007, Berkeley, CA. IEEE CS, 2007: 321-334. 被引量:1
  • 6WATERS B. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization [C]// Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography Conference on Public Key Cryptography, LNCS, 2011, 6571:53-70. 被引量:1
  • 7PARNO B, RAYKOVA M, VAIKUNTANATHAN V. How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Fncryption[C]//Proceedings of the 9th International Conference on Theory of Cryptography, LNCS, 2012, 7194: 422-439. 被引量:1
  • 8LEWKO A, SAHAI A, WATERS B. Revocation Systerm with Very Small Private Keys[C]//Proceedings of 2010 IEEE Symposium on Security and Privacy: May 16-19, 2010, Oakland, CA, USA. IEEE Press, 2010: 273-285. 被引量:1
  • 9HERRANZ J, LAGUILLAUMIE F, RAFOES C. Constant Size Ciphertexts in Threshold Attribute-Based Encryption [C]// Proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography, LNCS, 2010, 6056: 19-34. 被引量:1
  • 10ATTRAPADUNG N, LIBERT B, PANAFIEU E. Expressive Key-Policy Attnbute-Based Encryption with Constant-Size Ciphertexts [C]// Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography Conference on Public Key Cryptography, LNCS, 2011, 6571 : 90-108. 被引量:1

同被引文献28

  • 1刘光杰,戴跃伟,孙金生,王执铨.用于JPEG图像的高容量信息隐藏算法[J].信息与控制,2007,36(1):102-107. 被引量:14
  • 2SHEHAB M, SQUICCIARINI A, AHN G, et al. Access control for online social networks third party applications[J]. Computers and Security, 2012, 31 (8): 897-911. 被引量:1
  • 3RAJI F, MIRI A, JAZI M. CP2: Cryptographic privacy protection framework for online social networks[J]. Computers and Electrical Engineer- ing, 2013, 39(7): 2282-2298. 被引量:1
  • 4LAI Junzuo, DENG R H, GUAN Chaowen, et al. Attribute-Based Encryption with Verifiable Outsourced Decryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(8): 1343-1354. 被引量:1
  • 5WAN Zhiguo, LIU June, DENG R H. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 743-754. 被引量:1
  • 6WU Yongdong, WEI Zhuo, DENG R H. At- tribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks[J]. IEEE Transactions on Multimedia, 2013, 15(4): 778-788. 被引量:1
  • 7SHUAI Huimin, ZHU Wentao. Masque: Access Control for Interactive Sharing of Encrypted Data in Social Networks[C]// Proceedings of 6th International Conference on Network and System Security (NSS'2012): November 21-23, 2012. Wuyishan, Fujian, China, 2012: 503-515. 被引量:1
  • 8BETHENCOURT J, SAHAI A, WATERS B. Cipher- text-Policy Attribute-Based Encryption[C]//Pro- ceedings of 2007 IEEE Symposium on Security and Privacy (SP'07): May 20-23, 2007. Berkeley, CA, USA, 2007:321-334. 被引量:1
  • 9HUR J. Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid[J]. IEEE Transactions on Parallel and Distributed Sys- tems, 2013, 24(11): 2171-2180. 被引量:1
  • 10HU Hongxin, AHN G. Multiparty Authorization Framework for Data Sharing in Online Social Networks[C]// Proceedings of 25th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSec'2011): July 11-13, 2011. Richmond, VA, USA, 2011: 29-43. 被引量:1

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部