Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy

被引:8
|
作者
Xu, Shengmin [1 ]
Zhang, Yinghui [1 ,2 ]
Li, Yingjiu [2 ]
Liu, Ximeng [3 ,4 ]
Yang, Guomin [5 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Peoples R China
[2] Singapore Management Univ, Sch Informat Syst, Singapore, Singapore
[3] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou, Peoples R China
[4] Fuzhou Univ, Key Lab Informat Secur Network Syst, Fuzhou, Fujian, Peoples R China
[5] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW, Australia
基金
中国国家自然科学基金;
关键词
ElGamal-type cryptosystem; Attribute-based encryption; IDENTITY-BASED ENCRYPTION; SYSTEM ENCRYPTION; HIBE;
D O I
10.1007/978-3-030-37231-6_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud is a computing paradigm for allowing data owners to outsource their data to enjoy on-demand services and mitigate the burden of local data storage. However, secure sharing of data via cloud remains an essential issue since the cloud service provider is untrusted. Fortunately, asymmetric-key encryption, such as identity-based encryption (IBE) and attribute-based encryption (ABE), provides a promising tool to offer data confidentiality and has been widely applied in cloud-based applications. In this paper, we summarize the common properties of most of IBE and ABE and introduce a cryptographic primitive called ElGamal type cryptosystem. This primitive can be used to derive a variety of ABE schemes. To illustrate the feasibility, we present generic constructions of revocable attribute-based encryption and dual-policy attribute-based encryption with formal definitions and security proofs. By applying our proposed generic constructions, we also present instantiations of these schemes. Furthermore, we demonstrate the high performance of the proposed schemes via experiments.
引用
收藏
页码:184 / 204
页数:21
相关论文
共 50 条
  • [21] Cryptanalysis and Discussion on Two Attribute-Based Encryption Schemes
    Tseng, Yi-Fan
    Huang, Jheng-Jia
    Yang, Hao-Yu
    Chien, Tsung-Yu
    Wu, Chieh-Han
    2022 17TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY, ASIAJCIS, 2022, : 24 - 28
  • [22] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [23] A Generic Construction of Ciphertext-Policy Attribute. Based Encryption Supporting Attribute Revocation
    Wu Qiuxin
    CHINA COMMUNICATIONS, 2014, 11 (01) : 93 - 100
  • [24] A privacy-preserving personal health record with searchability and revocability using attribute-based encryption
    Duan, Shuhong
    Liu, Zhenhua
    Zhou, Peilin
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 831 - 838
  • [25] Generic Constructions for Fully Secure Revocable Attribute-Based Encryption
    Yamada, Kotoko
    Attrapadung, Nuttapong
    Emura, Keita
    Hanaoka, Goichiro
    Tanaka, Keisuke
    COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 532 - 551
  • [26] Generic Constructions for Fully Secure Revocable Attribute-Based Encryption
    Yamada, Kotoko
    Attrapadung, Nuttapong
    Emura, Keita
    Hanaoka, Goichiro
    Tanaka, Keisuke
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09): : 1456 - 1472
  • [27] A Survey on Attribute-Based Encryption Schemes Suitable for the Internet of Things
    Rasori, Marco
    La Manna, Michele
    Perazzo, Pericle
    Dini, Gianluca
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) : 8269 - 8290
  • [28] Attacking Pairing-Free Attribute-Based Encryption Schemes
    Herranz, Javier
    IEEE ACCESS, 2020, 8 : 222226 - 222232
  • [29] Accountable authority key policy attribute-based encryption
    WANG YongTao 1
    2 China Information Technology Security Evaluation Center
    3 Shanghai Key Laboratory of Scalable Computing and Systems
    4 State Key Laboratory of Information Security
    ScienceChina(InformationSciences), 2012, 55 (07) : 1631 - 1638
  • [30] Accountable authority key policy attribute-based encryption
    Wang YongTao
    Chen KeFei
    Long Yu
    Liu ZhaoHui
    SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (07) : 1631 - 1638