Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing

被引:29
|
作者
Yang, Yan [1 ,2 ]
Chen, Xingyuan [1 ,2 ,3 ]
Chen, Hao [4 ]
Du, Xuehui [2 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing 100044, Peoples R China
[2] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450001, Henan, Peoples R China
[3] State Key Lab Cryptol, Beijing 100878, Peoples R China
[4] China Acad Space Technol, State Key Lab Space Ground Integrated Informat Te, Beijing 100029, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
国家高技术研究发展计划(863计划);
关键词
Attribute-based encryption; decentralizing multi-authority attribute-based encryption; dual system encryption; IDENTITY-BASED ENCRYPTION; DUAL SYSTEM ENCRYPTION; HIBE;
D O I
10.1109/ACCESS.2018.2820182
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Decentralizing multi-authority attribute-based encryption (ABE) has been adopted for solving problems arising from sharing confidential corporate data in cloud computing. For decentralizing multi authority ABE systems that do not rely on a central authority, collusion resistance can be achieved using a global identifier. Therefore, identity needs to be managed globally, which results in the crucial problems of privacy and security. A scheme is developed that does not use a central authority to manage users and keys, and only simple trust relations need to be formed by sharing the public key between each attribute authority (AA). User identities are unique by combining a user's identity with the identity of the AA where the user is located. Once a key request needs to be made to an authority outside the domain, the request needs to be performed by the authority in the current domain rather than by the users, so, user identities remain private to the AA outside the domain, which will enhance privacy and security. In addition, the key issuing protocol between AA is simple as the result of the trust relationship of AA. Moreover, extensibility for authorities is also supported by the scheme presented in this paper. The scheme is based on composite order bilinear groups. A proof of security is presented that uses the dual system encryption methodology.
引用
收藏
页码:18009 / 18021
页数:13
相关论文
共 50 条
  • [21] Secure Online/Offline Multi-Authority Attribute-Based Encryption for Resource-Constrained Devices in Cloud Computing
    Shao, Jiaye
    Zhu, Yanqin
    Ji, Qijin
    2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 642 - 649
  • [22] SIMPLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION FOR SHORT MESSAGES
    Villanyi, Viktoria I.
    COMPUTING AND INFORMATICS, 2016, 35 (01) : 128 - 142
  • [23] ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, 2009, 46 (04) : 803 - 819
  • [24] New Multi-authority Attribute-based Encryption Scheme on Lattices
    Yan Xixi
    Liu Yuan
    Li Zichen
    Tang Yongli
    Ye Qing
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (04) : 811 - 817
  • [25] Efficient quantum multi-authority attribute-based encryption and generalizations
    Chaudhury, Shion Samadder
    QUANTUM INFORMATION PROCESSING, 2024, 23 (10)
  • [26] Decentralized Multi-Authority Attribute-based Searchable Encryption Scheme
    Ren, Juan
    Zhang, Leyou
    Wang, Baocang
    International Journal of Network Security, 2021, 23 (02) : 332 - 342
  • [27] Efficient Multi-authority Access Control using Attribute-based Encryption in Cloud Storage
    Challagidad, Praveen S.
    Birje, Mahantesh N.
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 840 - 849
  • [28] Multi-Authority Attribute-Based Encryption Scheme from Lattices
    Zhang, Guoyan
    Qin, Jing
    Qazi, Shams
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2015, 21 (03) : 483 - 501
  • [29] Key-Policy Multi-authority Attribute-Based Encryption
    Longo, Riccardo
    Marcolla, Chiara
    Sala, Massimiliano
    ALGEBRAIC INFORMATICS (CAI 2015), 2015, 9270 : 152 - 164
  • [30] Privacy-preserving Multi-authority Attribute-based Encryption with Dynamic Policy Updating in PHR
    Yan, Xixi
    Ni, Hao
    Liu, Yuan
    Han, Dezhi
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2019, 16 (03) : 831 - 847