Skip to main content
Top
Published in: Cluster Computing 3/2017

28-11-2016

New directly revocable attribute-based encryption scheme and its application in cloud storage environment

Authors: Hao Wang, Zhihua Zheng, Lei Wu, Ping Li

Published in: Cluster Computing | Issue 3/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Attribute-based encryption (ABE) is a special type of cryptosystem, which provide encryption and decryption functions based on users attributes. Due to the functionality and flexibility of ABE, it is considered to be suitable for providing data security and privacy preserving security in the cloud storage environment. However, lack of user revocation mechanism is considered to be a disadvantage of traditional ABE. In this paper, we study the direct revocation mechanism of ciphertext-policy ABE (CP-ABE), construct a new directly revocable CP-ABE in the composite order group, and prove it to achieve adaptive security using dual system encryption in the standard model. On this basis, we introduce user revocation centre (URC) in this system, and outsource the revocation tasks to URC. Users need not to master the latest revocation list for encrypting, and need not to pay any additional computing for revocation. In addition, when revocation list changes, URC can update the ciphertexts for users. Finally, we introduce how to deploy our schemes in cloud storage environment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Aiello, W., Lodha, S., Ostrovsky, R.: Fast digital identity revocation (extended abstract). In: Advances in Cryptology—CRYPTO ’98, Proceedings of 18th Annual International Cryptology Conference, Santa Barbara, California, August 23–27, 1998, pp. 137–152 (1998). doi:10.1007/BFb0055725 Aiello, W., Lodha, S., Ostrovsky, R.: Fast digital identity revocation (extended abstract). In: Advances in Cryptology—CRYPTO ’98, Proceedings of 18th Annual International Cryptology Conference, Santa Barbara, California, August 23–27, 1998, pp. 137–152 (1998). doi:10.​1007/​BFb0055725
2.
go back to reference Attrapadung, N., Imai, H.: Attribute-based encryption supporting direct/indirect revocation modes. In: Cryptography and Coding, Proceedings of 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15–17, 2009. pp. 278–300 (2009). doi:10.1007/978-3-642-10868-6_17 Attrapadung, N., Imai, H.: Attribute-based encryption supporting direct/indirect revocation modes. In: Cryptography and Coding, Proceedings of 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15–17, 2009. pp. 278–300 (2009). doi:10.​1007/​978-3-642-10868-6_​17
3.
go back to reference Attrapadung, N., Imai, H.: Conjunctive broadcast and attribute-based encryption. In: Pairing-Based Cryptography—Pairing 2009, Proceedings of Third International Conference, Palo Alto, CA, August 12–14, 2009, pp. 248–265 (2009). doi:10.1007/978-3-642-03298-1_16 Attrapadung, N., Imai, H.: Conjunctive broadcast and attribute-based encryption. In: Pairing-Based Cryptography—Pairing 2009, Proceedings of Third International Conference, Palo Alto, CA, August 12–14, 2009, pp. 248–265 (2009). doi:10.​1007/​978-3-642-03298-1_​16
4.
go back to reference Beimel, A.: Secure schemes for secret sharing and key distribution. PhD thesis, Israel Institute of Technology, Technion, Haifa (1996) Beimel, A.: Secure schemes for secret sharing and key distribution. PhD thesis, Israel Institute of Technology, Technion, Haifa (1996)
5.
go back to reference Chase, M.: Multi-authority attribute based encryption. In: Theory of Cryptography, Proceedings of 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, February 21–24, 2007, pp. 515–534 (2007) Chase, M.: Multi-authority attribute based encryption. In: Theory of Cryptography, Proceedings of 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, February 21–24, 2007, pp. 515–534 (2007)
6.
go back to reference Cui, H., Deng, R.H., Li, Y., Qin, B.: Server-aided revocable attribute-based encryption. In: Computer Security—ESORICS 2016. Proceedings of 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26–30, 2016, Part II, pp. 570–587 (2016). doi:10.1007/978-3-319-45741-3_29 Cui, H., Deng, R.H., Li, Y., Qin, B.: Server-aided revocable attribute-based encryption. In: Computer Security—ESORICS 2016. Proceedings of 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26–30, 2016, Part II, pp. 570–587 (2016). doi:10.​1007/​978-3-319-45741-3_​29
7.
go back to reference Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016). doi:10.1109/TPDS.2015.2506573 Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016). doi:10.​1109/​TPDS.​2015.​2506573
9.
go back to reference Garg, S., Gentry, C., Halevi, S., Sahai, A., Waters, B.: Attribute-based encryption for circuits from multilinear maps. In: Advances in Cryptology—CRYPTO 2013. Proceedings of 33rd Annual Cryptology Conference, Santa Barbara, CA, August 18–22, 2013. Part II, pp. 479–499 (2013). doi:10.1007/978-3-642-40084-1_27 Garg, S., Gentry, C., Halevi, S., Sahai, A., Waters, B.: Attribute-based encryption for circuits from multilinear maps. In: Advances in Cryptology—CRYPTO 2013. Proceedings of 33rd Annual Cryptology Conference, Santa Barbara, CA, August 18–22, 2013. Part II, pp. 479–499 (2013). doi:10.​1007/​978-3-642-40084-1_​27
10.
go back to reference Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations, pp. 579–591 (2008) Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations, pp. 579–591 (2008)
11.
go back to reference Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, October 30–November 3, 2006, pp. 89–98 (2006) Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, October 30–November 3, 2006, pp. 89–98 (2006)
12.
go back to reference Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: Proceedings of 20th USENIX Security Symposium, San Francisco, CA, USA, August 8–12 (2011) Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: Proceedings of 20th USENIX Security Symposium, San Francisco, CA, USA, August 8–12 (2011)
13.
14.
20.
go back to reference Lewko, A.B., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Advances in Cryptology—EUROCRYPT 2010, Proceedings of 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30–June 3, 2010. pp. 62–91 (2010) Lewko, A.B., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Advances in Cryptology—EUROCRYPT 2010, Proceedings of 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30–June 3, 2010. pp. 62–91 (2010)
21.
go back to reference Lewko, A.B., Waters, B.: New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Theory of Cryptography, Proceedings of 7th Theory of Cryptography Conference, TCC 2010, Zurich, February 9–11, 2010. pp. 455–479 (2010) Lewko, A.B., Waters, B.: New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Theory of Cryptography, Proceedings of 7th Theory of Cryptography Conference, TCC 2010, Zurich, February 9–11, 2010. pp. 455–479 (2010)
22.
go back to reference Li, J., Chen, X., Li, M., Li, J., Lee, P.P.C., Lou, W.: Secure deduplication with efficient and reliable convergent key management. IEEE Trans. Parallel Distrib. Syst. 25(6), 1615–1625 (2014). doi:10.1109/TPDS.2013.284 CrossRef Li, J., Chen, X., Li, M., Li, J., Lee, P.P.C., Lou, W.: Secure deduplication with efficient and reliable convergent key management. IEEE Trans. Parallel Distrib. Syst. 25(6), 1615–1625 (2014). doi:10.​1109/​TPDS.​2013.​284 CrossRef
23.
go back to reference Li, J., Huang, Q., Chen, X., Chow, S.S.M., Wong, D.S., Xie, D.: Multi-authority ciphertext-policy attribute-based encryption with accountability. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22–24, 2011, pp. 386–390 (2011). doi:10.1145/1966913.1966964 Li, J., Huang, Q., Chen, X., Chow, S.S.M., Wong, D.S., Xie, D.: Multi-authority ciphertext-policy attribute-based encryption with accountability. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22–24, 2011, pp. 386–390 (2011). doi:10.​1145/​1966913.​1966964
24.
go back to reference Li, J., Huang, X., Li, J., Chen, X., Xiang, Y.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25(8), 2201–2210 (2014)CrossRef Li, J., Huang, X., Li, J., Chen, X., Xiang, Y.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25(8), 2201–2210 (2014)CrossRef
25.
go back to reference Li, J., Jia, C., Li, J., Chen, X.: Outsourcing encryption of attribute-based encryption with mapreduce. In: Information and Communications Security, Proceedings of 14th International Conference, ICICS 2012, Hong Kong, China, October 29–31, 2012. pp. 191–201 (2012) Li, J., Jia, C., Li, J., Chen, X.: Outsourcing encryption of attribute-based encryption with mapreduce. In: Information and Communications Security, Proceedings of 14th International Conference, ICICS 2012, Hong Kong, China, October 29–31, 2012. pp. 191–201 (2012)
27.
go back to reference Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Advances in Cryptology—CRYPTO 2001. In: Proceedings of 21st Annual International Cryptology Conference, Santa Barbara, California, August 19–23, 2001, pp. 41–62 (2001). doi:10.1007/3-540-44647-8_3 Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Advances in Cryptology—CRYPTO 2001. In: Proceedings of 21st Annual International Cryptology Conference, Santa Barbara, California, August 19–23, 2001, pp. 41–62 (2001). doi:10.​1007/​3-540-44647-8_​3
28.
go back to reference Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, VA, October 28–31, 2007, pp. 195–203 (2007) Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, VA, October 28–31, 2007, pp. 195–203 (2007)
29.
go back to reference Pirretti, M., Traynor, P., McDaniel, P., Waters, B.: Secure attribute-based systems. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, Ioctober 30–November 3, 2006, pp. 99–112 (2006) Pirretti, M., Traynor, P., McDaniel, P., Waters, B.: Secure attribute-based systems. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, Ioctober 30–November 3, 2006, pp. 99–112 (2006)
30.
go back to reference Ren, Y., Shen, J., Wang, J., Han, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2), 317–324 (2015) Ren, Y., Shen, J., Wang, J., Han, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2), 317–324 (2015)
31.
go back to reference Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Advances in Cryptology—CRYPTO 2012. Proceedings of 32nd Annual Cryptology Conference, Santa Barbara, CA, August 19–23, 2012. pp. 199–217 (2012). doi:10.1007/978-3-642-32009-5_13 Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Advances in Cryptology—CRYPTO 2012. Proceedings of 32nd Annual Cryptology Conference, Santa Barbara, CA, August 19–23, 2012. pp. 199–217 (2012). doi:10.​1007/​978-3-642-32009-5_​13
32.
go back to reference Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology - EUROCRYPT 2005, Proceedings of 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22–26, 2005, pp. 457–473 (2005) Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology - EUROCRYPT 2005, Proceedings of 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22–26, 2005, pp. 457–473 (2005)
33.
34.
go back to reference Shen, J., Tan, H., Wang, J., Wang, J., Lee, S.: A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16(1), 171–178 (2015) Shen, J., Tan, H., Wang, J., Wang, J., Lee, S.: A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16(1), 171–178 (2015)
36.
go back to reference Wang, H., He, D., Shen, J., Zheng, Z., Zhao, C., Zhao, M.: Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing Wang, H., He, D., Shen, J., Zheng, Z., Zhao, C., Zhao, M.: Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
37.
go back to reference Wang, H., Zheng, Z., Wu, L., Wang, Y.: Adaptively secure outsourcing ciphertext-policy attribute-based encryption. J. Comput. Res. Dev. 52(10), 2270–2280 (2015) Wang, H., Zheng, Z., Wu, L., Wang, Y.: Adaptively secure outsourcing ciphertext-policy attribute-based encryption. J. Comput. Res. Dev. 52(10), 2270–2280 (2015)
Metadata
Title
New directly revocable attribute-based encryption scheme and its application in cloud storage environment
Authors
Hao Wang
Zhihua Zheng
Lei Wu
Ping Li
Publication date
28-11-2016
Publisher
Springer US
Published in
Cluster Computing / Issue 3/2017
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-016-0701-7

Other articles of this Issue 3/2017

Cluster Computing 3/2017 Go to the issue

Premium Partner