Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy

被引:8
|
作者
Xu, Shengmin [1 ]
Zhang, Yinghui [1 ,2 ]
Li, Yingjiu [2 ]
Liu, Ximeng [3 ,4 ]
Yang, Guomin [5 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Peoples R China
[2] Singapore Management Univ, Sch Informat Syst, Singapore, Singapore
[3] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou, Peoples R China
[4] Fuzhou Univ, Key Lab Informat Secur Network Syst, Fuzhou, Fujian, Peoples R China
[5] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW, Australia
基金
中国国家自然科学基金;
关键词
ElGamal-type cryptosystem; Attribute-based encryption; IDENTITY-BASED ENCRYPTION; SYSTEM ENCRYPTION; HIBE;
D O I
10.1007/978-3-030-37231-6_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud is a computing paradigm for allowing data owners to outsource their data to enjoy on-demand services and mitigate the burden of local data storage. However, secure sharing of data via cloud remains an essential issue since the cloud service provider is untrusted. Fortunately, asymmetric-key encryption, such as identity-based encryption (IBE) and attribute-based encryption (ABE), provides a promising tool to offer data confidentiality and has been widely applied in cloud-based applications. In this paper, we summarize the common properties of most of IBE and ABE and introduce a cryptographic primitive called ElGamal type cryptosystem. This primitive can be used to derive a variety of ABE schemes. To illustrate the feasibility, we present generic constructions of revocable attribute-based encryption and dual-policy attribute-based encryption with formal definitions and security proofs. By applying our proposed generic constructions, we also present instantiations of these schemes. Furthermore, we demonstrate the high performance of the proposed schemes via experiments.
引用
收藏
页码:184 / 204
页数:21
相关论文
共 50 条
  • [31] Ciphertext Policy-Hiding Attribute-Based Encryption
    Yadav, Umesh Chandra
    Ali, Syed Taqi
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 2067 - 2071
  • [32] A Key-Policy Attribute-Based Broadcast Encryption
    Sun, Jin
    Hu, Yupu
    Zhang, Leyou
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (05) : 444 - 452
  • [33] Comparison of attribute-based encryption schemes in securing healthcare systems
    Walid, Redwan
    Joshi, Karuna Pande
    Choi, Seung Geol
    SCIENTIFIC REPORTS, 2024, 14 (01)
  • [34] Attribute-based encryption schemes with constant-size ciphertexts
    Attrapadung, Nuttapong
    Herranz, Javier
    Laguillaumie, Fabien
    Libert, Benoit
    de Panafieu, Elie
    Rafols, Carla
    THEORETICAL COMPUTER SCIENCE, 2012, 422 : 15 - 38
  • [35] Ciphertext-policy attribute-based delay encryption
    Chen, Lijiao
    Lv, Kewei
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (02) : 167 - 185
  • [36] Accountable authority key policy attribute-based encryption
    YongTao Wang
    KeFei Chen
    Yu Long
    ZhaoHui Liu
    Science China Information Sciences, 2012, 55 : 1631 - 1638
  • [37] Ciphertext Policy Attribute-Based Encryption from Lattices
    Zhang, Jiang
    Zhang, Zhenfeng
    Ge, Aijun
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [38] Cryptanalysis of ElGamal type encryption schemes based on conic curves
    Dai, ZD
    Ye, DF
    Pei, DY
    Yang, JH
    ELECTRONICS LETTERS, 2001, 37 (07) : 426 - 426
  • [39] Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption
    Kim, Intae
    Susilo, Willy
    Baek, Joonsang
    Kim, Jongkil
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1856 - 1870
  • [40] Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption
    Mao, Xianping
    Lai, Junzuo
    Mei, Qixiang
    Chen, Kefei
    Weng, Jian
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (05) : 533 - 546