Practical revocable and multi-authority CP-ABE scheme from RLWE for Cloud Computing

被引:13
|
作者
Yang, Yang [1 ]
Sun, Jianguo [1 ]
Liu, Zechao [1 ]
Qiao, YuQing [1 ]
机构
[1] Harbin Engn Univ, Dept Comp Sci & Technol, Harbin 150001, Peoples R China
基金
国家重点研发计划;
关键词
Attribute-based encryption; RLWE; Multi-authority; Attribute revocation; Multi-valued attributes; ENCRYPTION SCHEME; ACCESS-CONTROL; ATTRIBUTE; DECRYPTION;
D O I
10.1016/j.jisa.2022.103108
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing provides enterprises and individuals with unlimited computing resources and expandable storage space. However, data leakage occurs frequently due to the lack of protection measures in the cloud storage environment. Consequently, how to protect data security in the cloud has become a critical issue. Attribute-based encryption (ABE) is an emerging encryption technique, which protects sensitive information and provides access control for data stored in the cloud. However, most of existing ABE schemes cannot resist quantum attacks and lack the capability of implementing flexible revocation on user or attribute when the attributes of a user change, which hinders the practical application of ABE. In this research, we present a Revocable and Multi-authority ciphertext-policy attribute-based encryption (RM-CP-ABE) from the ring learning with errors (RLWE) assumption, which supports multi-authority and multi-valued attributes. The scheme allows multiple authorities to involve in key distribution, and achieves the attribute revocation when the user's access rights change. Also, the scheme enjoys reasonable computational cost and storage overhead, and is proven selectively secure under the RLWE assumption. The simulation results indicate that the performance of the proposed scheme is acceptable for practical applications.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] CP-ABE Scheme with Fast Decryption for Public Cloud
    Zou L.-P.
    Feng C.-S.
    Qin Z.-G.
    Yuan D.
    Luo W.-P.
    Li M.
    Ruan Jian Xue Bao/Journal of Software, 2020, 31 (06): : 1817 - 1828
  • [32] A SEARCHABLE ENCRYPTION OF CP-ABE SCHEME IN CLOUD STORAGE
    Xiong, An-Ping
    Gan, Qi-Xian
    He, Xin-Xin
    Zhao, Quan
    2013 10TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2013, : 345 - 349
  • [33] A multi Ability CP-ABE access control scheme for public cloud storage
    Deepthi, Kothapalli Chaitanya
    Ashok, Dasari
    Krishna, M.
    INTERNATIONAL CONFERENCE ON COMPUTER VISION AND MACHINE LEARNING, 2019, 1228
  • [34] A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing
    Tu, Shanshan
    Waqas, Muhammad
    Huang, Fengming
    Abbas, Ghulam
    Abbas, Ziaul Haq
    COMPUTER NETWORKS, 2021, 195
  • [35] A Novel Revocable Personal Health Record Scheme Using outsourced CP-ABE
    Huang, Nana
    Shen, Liang
    PROCEEDINGS OF THE 2018 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY (ICMMCT 2018), 2018, 152 : 280 - 286
  • [36] Multi-authority ABE for access control in cloud storage
    Li, Xie-Hua
    Zhang, Meng-Meng
    Liu, Hong
    Wang, Yong-Jun
    Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 2015, 42 (10): : 133 - 140
  • [37] A CP-ABE Scheme with Cloud Proxy Re-Encryption
    Zhao K.-Q.
    Kang P.
    Liu B.
    Guo Z.
    Feng C.-S.
    Qing Y.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (03): : 728 - 735
  • [38] NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems
    Xu Xiao-long
    Zhang Qi-tong
    Zhou Jing-lan
    JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2017, 24 (04) : 807 - 818
  • [39] A dynamic searchable encryption CP-ABE scheme in cloud storage
    Yi, Jiang
    Hao, Feng
    PROCEEDINGS OF THE 2016 3RD INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING, MANUFACTURING TECHNOLOGY AND CONTROL, 2016, 67 : 478 - 481
  • [40] Multi-authority Based Weighted Attribute Encryption Scheme in Cloud Computing
    Wang, Yun
    Zhang, Dalei
    Zhong, Hong
    2014 10TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2014, : 1033 - 1038