A CP-ABE Scheme with Cloud Proxy Re-Encryption

被引:0
|
作者
Zhao K.-Q. [1 ]
Kang P. [1 ]
Liu B. [1 ]
Guo Z. [1 ]
Feng C.-S. [2 ]
Qing Y. [3 ]
机构
[1] Department of Computer Science, Sichuan Normal University, Sichuan, Chengdu
[2] Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Sichuan, Chengdu
[3] The No.30 Institute of China Electronic Technology Corporation, Sichuan, Chengdu
来源
基金
中国国家自然科学基金;
关键词
access control; attribute-based encryption; cloud computing; cloud proxy re-encryption; sCPA;
D O I
10.12263/DZXB.20210445
中图分类号
学科分类号
摘要
Aiming at the problem that the existing CP-ABE (Ciphertext-Policy Attribute-Based Encryption) proxy re-encryption scheme is difficult to support cloud proxy re-encryption because the proxy can decrypt the re-encrypted ciphertext and modify the access policy arbitrarily, we propose a CP-ABE-CPRE (CP-ABE Scheme with Cloud Proxy Re-Encryption) scheme. CP-ABE-CPRE supports attribute revocation by using version numbers to identify private key and ciphertext at different stages. Only when the user private key's edition number matches the ciphertext's and the user's attributes meet the access policy, the user can decrypt the ciphertext. When revoking an attribute, cloud can update the confidential data corresponding to the attribute needed revoking without modifying the access policy. Moreover, this scheme also reduces the number of ciphertext and user private key updates through lazy and batch updates, and improves update efficiency. Analysis of theoretical and experimental results both show that CP-ABE-CPRE is superior to related existing solutions in terms of computational and storage cost. And security analysis shows that CP-ABE-CPRE resists the selective chosen plaintext attack. © 2023 Chinese Institute of Electronics. All rights reserved.
引用
收藏
页码:728 / 735
页数:7
相关论文
共 22 条
  • [1] SAHAI A, WATERS B., Fuzzy identity-based encryption, Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques, pp. 457-473, (2005)
  • [2] GOYAL V, PANDEY O, SAHAI A, Et al., Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM Conference On Computer And Communications Security, pp. 89-98, (2006)
  • [3] BETHENCOURT J, SAHAI A, WATERS B., Ciphertext-policy attribute-based encryption, 2007 IEEE Symposium on Security and Privacy, pp. 321-334, (2007)
  • [4] WATERS B., Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization, International Workshop on Public Key Cryptography, pp. 53-70, (2011)
  • [5] BALU A, KUPPUSAMY K., An expressive and provably secure ciphertext-policy attribute-based encryption, Information Sciences, 276, pp. 354-362, (2014)
  • [6] LIANG X H, CAO Z F, LIN H, Et al., Attribute based proxy re-encryption with delegating capabilities, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 276-286, (2009)
  • [7] LUO S, HU J B, CHEN Z., Ciphertext policy attribute-based proxy re-encryption, International Conference on Information and Communications Security, pp. 401-415, (2010)
  • [8] LI J J, LIU Z H, ZU L H., Chosen-ciphertext secure multi-use unidirectional attribute-based proxy re-encryptions, 2014 Ninth Asia Joint Conference on Information Security, pp. 96-103, (2014)
  • [9] KAWAI Y., Outsourcing the re-encryption key generation: flexible ciphertext-policy attribute-based proxy re-encryption, Information Security Practice and Experience, pp. 301-315, (2015)
  • [10] LIANG K T, AU M H, LIU J K, Et al., A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing, Future Generation Computer Systems, 52, pp. 95-108, (2015)