Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy

被引:8
|
作者
Xu, Shengmin [1 ]
Zhang, Yinghui [1 ,2 ]
Li, Yingjiu [2 ]
Liu, Ximeng [3 ,4 ]
Yang, Guomin [5 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Peoples R China
[2] Singapore Management Univ, Sch Informat Syst, Singapore, Singapore
[3] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou, Peoples R China
[4] Fuzhou Univ, Key Lab Informat Secur Network Syst, Fuzhou, Fujian, Peoples R China
[5] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW, Australia
基金
中国国家自然科学基金;
关键词
ElGamal-type cryptosystem; Attribute-based encryption; IDENTITY-BASED ENCRYPTION; SYSTEM ENCRYPTION; HIBE;
D O I
10.1007/978-3-030-37231-6_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud is a computing paradigm for allowing data owners to outsource their data to enjoy on-demand services and mitigate the burden of local data storage. However, secure sharing of data via cloud remains an essential issue since the cloud service provider is untrusted. Fortunately, asymmetric-key encryption, such as identity-based encryption (IBE) and attribute-based encryption (ABE), provides a promising tool to offer data confidentiality and has been widely applied in cloud-based applications. In this paper, we summarize the common properties of most of IBE and ABE and introduce a cryptographic primitive called ElGamal type cryptosystem. This primitive can be used to derive a variety of ABE schemes. To illustrate the feasibility, we present generic constructions of revocable attribute-based encryption and dual-policy attribute-based encryption with formal definitions and security proofs. By applying our proposed generic constructions, we also present instantiations of these schemes. Furthermore, we demonstrate the high performance of the proposed schemes via experiments.
引用
收藏
页码:184 / 204
页数:21
相关论文
共 50 条
  • [41] Generic user revocation systems for attribute-based encryption in cloud storage
    Chen, Genlang
    Xu, Zhiqian
    Jiang, Hai
    Li, Kuan-ching
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2018, 19 (11) : 1362 - 1384
  • [42] Generic user revocation systems for attribute-based encryption in cloud storage
    Genlang CHEN
    Zhiqian XU
    Hai JIANG
    Kuan-ching LI
    FrontiersofInformationTechnology&ElectronicEngineering, 2018, 19 (11) : 1362 - 1384
  • [43] Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing
    Qin, Baodong
    Zheng, Dong
    IEEE ACCESS, 2019, 7 : 42331 - 42342
  • [44] Generic user revocation systems for attribute-based encryption in cloud storage
    Genlang Chen
    Zhiqian Xu
    Hai Jiang
    Kuan-ching Li
    Frontiers of Information Technology & Electronic Engineering, 2018, 19 : 1362 - 1384
  • [45] Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Yiu, S. M.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 108 : 112 - 123
  • [46] Efficient Attribute-Based Encryption Schemes for Secure Communications in Cyber Defense
    Mao, Yijun
    Zhang, Yue
    Chen, Min-Rong
    Li, Yongbiao
    Zhan, Yiju
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2016, 22 (03): : 397 - 403
  • [47] A practical construction for large universe hierarchical attribute-based encryption
    Li, Cong
    Fang, Yuejian
    Zhang, Xing
    Jin, Cancan
    Shen, Qingni
    Wu, Zhonghai
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (17):
  • [48] Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Schemes with Fast Decryption
    Rao, Y. Sreenivasa
    INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 521 - 531
  • [49] Securely outsourcing the ciphertext-policy attribute-based encryption
    Kim Thuat Nguyen
    Oualha, Nouha
    Laurent, Maryline
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01): : 169 - 183
  • [50] GPU Acceleration of Ciphertext-Policy Attribute-Based Encryption
    Fan, Kai
    Zhang, Chaoyu
    Shan, Ruiwen
    Yu, Hexuan
    Jiang, Hai
    2019 20TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2019, : 94 - 101