scispace - formally typeset
Open AccessJournal ArticleDOI

Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.

Shangping Wang, +2 more
- 13 Sep 2018 - 
- Vol. 13, Iss: 9
Reads0
Chats0
TLDR
This work proposes a traceable CP-ABE scheme with attribute-level user revocation for cloud storage (TUR-CPABE), which has the ability to trace malicious users who have leaked key information from the system and allows ABE fine-grained access control.
Abstract
In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user may have multiple attributes, and each attribute may be shared simultaneously by many users. The decryption key of an attribute can thus be shared by many users who all possess the attribute. For monetary gain, a malicious authorized user may reveal his/her decryption key to a third party, and it is difficult to trace the owner of primitive secret key from an exposed key. At the same time, this situation may also limit commercial applications of CP-ABE systems. To solve these problems and enable fine-grained access control for the encrypted data, we propose a traceable CP-ABE scheme with attribute-level user revocation for cloud storage (TUR-CPABE). Our scheme enjoys four advantages. First, it has the ability to trace malicious users who have leaked key information from the system. Second, it supports attribute-level user revocation for malicious users and allows ABE fine-grained access control. Third, it allows secret key updates and ciphertext updates to resist collusion attacks between users. Fourth, outsourcing encryption, decryption and attribute revocation are used to reduce the computational burden on data owners, data users and the trust authority, respectively. In addition, our scheme has been proven to be secure against chosen plaintext attacks under a selective access policy based on decisional q - BDHE assumption in the standard model.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection

TL;DR: In this paper , a CP-ABE scheme that realizes revocation, white-box traceability, and the application of hidden policy is proposed, and such ciphertext is composed of two parts.
Journal ArticleDOI

Large-Universe Attribute-Based Encryption With Public Traceability for Cloud Storage

TL;DR: This article seeks to address both key abuse and key escrow concerns when deploying ABE in a cloud computing environment, and its scheme is based on prime order bilinear groups, and is shown to be selectively secure in the standard model.
Journal ArticleDOI

Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage

TL;DR: This paper proposes a verifiable and multi-keyword searchable attribute-based encryption (VMKS-ABE) scheme for cloud storage, in which multi- keyword can be searched and the search privacy is protected, and the proposed scheme is proved secure that the keyword index is indistinguishable under the adaptive keyword attacks in the general group model.
Journal ArticleDOI

Updatable Ciphertext-Policy Attribute-Based Encryption Scheme With Traceability and Revocability

TL;DR: This work proposes a novel updatable CP-ABE scheme supporting white-box traceability and traitor revocation, which is more efficient, and can achieve valid revocation and ciphertext update.
Journal ArticleDOI

A Privacy Protection Scheme for IoT Big Data Based on Time and Frequency Limitation

TL;DR: Wang et al. as mentioned in this paper proposed a data privacy protection scheme based on time and decryption frequency limitation that can be applied in the Internet of Things, which effectively solves the problem of data leakage that may be caused by multiple accesses in a long time.
References
More filters
Book ChapterDOI

Identity-Based Encryption from the Weil Pairing

TL;DR: This work proposes a fully functional identity-based encryption scheme (IBE) based on the Weil pairing that has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem.
Proceedings ArticleDOI

Ciphertext-Policy Attribute-Based Encryption

TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Proceedings ArticleDOI

Attribute-based encryption for fine-grained access control of encrypted data

TL;DR: This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption.
Book ChapterDOI

Fuzzy identity-based encryption

TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Posted Content

Fuzzy Identity Based Encryption.

TL;DR: In this paper, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Related Papers (5)