Article

Journal of Computer Science and Technology

, Volume 26, Issue 4, pp 697-710

Provably Secure Role-Based Encryption with Revocation Mechanism

  • Yan ZhuAffiliated withInstitute of Computer Science and Technology, Peking UniversityBeijing Key Laboratory of Internet Security Technology, Peking University Email author 
  • , Hong-Xin HuAffiliated withSchool of Computing, Informatics and Decision Systems Engineering, Arizona State University
  • , Gail-Joon AhnAffiliated withSchool of Computing, Informatics and Decision Systems Engineering, Arizona State University
  • , Huai-Xi WangAffiliated withSchool of Mathematical Sciences, Peking University
  • , Shan-Biao WangAffiliated withSchool of Mathematical Sciences, Peking University

Rent the article at a discount

Rent now

* Final gross prices may vary according to local VAT.

Get Access

Abstract

Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hierarchical RBAC model. In this paper, we present a practical RBE scheme with revocation mechanism based on partial-order key hierarchy with respect to the public key infrastructure, in which each user is assigned with a unique private-key to support user identification, and each role corresponds to a public group-key that is used to encrypt data. Based on this key hierarchy structure, our RBE scheme allows a sender to directly specify a role for encrypting data, which can be decrypted by all senior roles, as well as to revoke any subgroup of users and roles. We give a full proof of security of our scheme against hierarchical collusion attacks. In contrast to the existing solutions for encrypted file systems, our scheme not only supports dynamic joining and revoking users, but also has shorter ciphertexts and constant-size decryption keys.

Keywords

cryptography role-based encryption role hierarchy key hierarchy collusion security revocation