Skip to main content

2019 | OriginalPaper | Buchkapitel

Requester-Centric CP-ABE Combining Removing Escrow and Outsourcing Decryption

verfasst von : Wang Yao, Faguo Wu, Xiao Zhang

Erschienen in: Cyberspace Safety and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Key escrow and low efficiency are two practical bottlenecks of attribute-based encryption. In this paper, a Requester-Centric CP-ABE (RC-CP-ABE) combining removing escrow and outsourcing decryption is proposed. By the bilinear map of composite order, we optimized the computational complexity of key transformation in the case of a large number of attributes. Without adding roles in the system, data requesters can undertake the key transformation which make them the center in the interactive process and the bridge linking removing escrow with outsourcing decryption. Security analysis has been made to prove our algorithm secure.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334 (2007) Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334 (2007)
2.
Zurück zum Zitat Castiglione, A., et al.: Hierarchical and shared access control. IEEE Trans. Inf. Forensics Secur. 11(4), 850–865 (2016) Castiglione, A., et al.: Hierarchical and shared access control. IEEE Trans. Inf. Forensics Secur. 11(4), 850–865 (2016)
4.
Zurück zum Zitat Fan, L., Zhao, R., Gong, F.K., Yang, N., Karagiannidis, G.: Secure multiple amplify-and-forward relaying over correlated fading channels. IEEE Trans. Commun. 65(7), 2811–2820 (2017)CrossRef Fan, L., Zhao, R., Gong, F.K., Yang, N., Karagiannidis, G.: Secure multiple amplify-and-forward relaying over correlated fading channels. IEEE Trans. Commun. 65(7), 2811–2820 (2017)CrossRef
5.
Zurück zum Zitat Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security, pp. 89–98 (2006) Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security, pp. 89–98 (2006)
7.
Zurück zum Zitat Huang, Q., Zhaofeng, M.A., Yang, Y., Jingyi, F.U., Niu, X.: Eabds:attribute-based secure data sharing with efficient revocation in cloud computing. Chin. J. Electron. 24(4), 862–868 (2015)CrossRef Huang, Q., Zhaofeng, M.A., Yang, Y., Jingyi, F.U., Niu, X.: Eabds:attribute-based secure data sharing with efficient revocation in cloud computing. Chin. J. Electron. 24(4), 862–868 (2015)CrossRef
9.
Zurück zum Zitat Jiang, W., Wang, G., Bhuiyan, M.Z.A., Wu, J.: Understanding graph-based trust evaluation in online social networks: methodologies and challenges. ACM Comput. Surv. 49(1), 1–35 (2016)CrossRef Jiang, W., Wang, G., Bhuiyan, M.Z.A., Wu, J.: Understanding graph-based trust evaluation in online social networks: methodologies and challenges. ACM Comput. Surv. 49(1), 1–35 (2016)CrossRef
10.
12.
Zurück zum Zitat Li, H., Liu, D., Dai, Y., Luan, T., Yu, S.: Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Trans. Emerg. Top. Comput. 6(1), 97–109 (2015)CrossRef Li, H., Liu, D., Dai, Y., Luan, T., Yu, S.: Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Trans. Emerg. Top. Comput. 6(1), 97–109 (2015)CrossRef
13.
Zurück zum Zitat Li, H., Liu, D., Dai, Y., Luan, T.H., Shen, X.S.: Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans. Emerg. Top. Comput. 3(1), 127–138 (2015)CrossRef Li, H., Liu, D., Dai, Y., Luan, T.H., Shen, X.S.: Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans. Emerg. Top. Comput. 3(1), 127–138 (2015)CrossRef
15.
Zurück zum Zitat Li, J., et al.: Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72, 1–12 (2017)CrossRef Li, J., et al.: Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72, 1–12 (2017)CrossRef
18.
Zurück zum Zitat Liu, J.K., Man, H.A., Huang, X., Lu, R., Li, J.: Fine-grained two-factor access control for web-based cloud computing services. IEEE Trans. Inf. Forensics Secur. 11(3), 484–497 (2015)CrossRef Liu, J.K., Man, H.A., Huang, X., Lu, R., Li, J.: Fine-grained two-factor access control for web-based cloud computing services. IEEE Trans. Inf. Forensics Secur. 11(3), 484–497 (2015)CrossRef
19.
Zurück zum Zitat Luo, E., Liu, Q., Wang, G.: Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Commun. Lett. 20(9), 1772–1775 (2016) CrossRef Luo, E., Liu, Q., Wang, G.: Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Commun. Lett. 20(9), 1772–1775 (2016) CrossRef
21.
Zurück zum Zitat Pan, G., Lei, H., Deng, Y., Fan, L., Yang, J., Chen, Y., Ding, Z.: On secrecy performance of MISO SWIPT systems with TAS and imperfect CSI. IEEE Trans. Commun. 64(9), 3831–3843 (2016)CrossRef Pan, G., Lei, H., Deng, Y., Fan, L., Yang, J., Chen, Y., Ding, Z.: On secrecy performance of MISO SWIPT systems with TAS and imperfect CSI. IEEE Trans. Commun. 64(9), 3831–3843 (2016)CrossRef
24.
Zurück zum Zitat Wang, S., Liang, K., Liu, J.K., Chen, J.: Attribute-based data sharing scheme revisited in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(8), 1–1 (2016)CrossRef Wang, S., Liang, K., Liu, J.K., Chen, J.: Attribute-based data sharing scheme revisited in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(8), 1–1 (2016)CrossRef
25.
Zurück zum Zitat Wang, Z., Liu, W.: CP-ABE with outsourced decryption and directionally hidden policy. Secur. Commun. Netw. 9(14), 2387–2396 (2016)CrossRef Wang, Z., Liu, W.: CP-ABE with outsourced decryption and directionally hidden policy. Secur. Commun. Netw. 9(14), 2387–2396 (2016)CrossRef
27.
Zurück zum Zitat Xhafa, F., Feng, J., Zhang, Y., Chen, X., Li, J.: Privacy-aware attribute-based PHR sharing with user accountability in cloud computing. J. Supercomput. 71(5), 1607–1619 (2015)CrossRef Xhafa, F., Feng, J., Zhang, Y., Chen, X., Li, J.: Privacy-aware attribute-based PHR sharing with user accountability in cloud computing. J. Supercomput. 71(5), 1607–1619 (2015)CrossRef
28.
Zurück zum Zitat Zhao, R., Yuan, Y., Fan, L., He, Y.C.: Secrecy performance analysis of cognitive decode-and-forward relay networks in nakagami-\(m\) fading channels. IEEE Trans. Commun. 65(2), 549–563 (2017)CrossRef Zhao, R., Yuan, Y., Fan, L., He, Y.C.: Secrecy performance analysis of cognitive decode-and-forward relay networks in nakagami-\(m\) fading channels. IEEE Trans. Commun. 65(2), 549–563 (2017)CrossRef
Metadaten
Titel
Requester-Centric CP-ABE Combining Removing Escrow and Outsourcing Decryption
verfasst von
Wang Yao
Faguo Wu
Xiao Zhang
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-37352-8_17