Advertisement

Anonymous Leakage-Resilient Ciphertext-Policy Attribute-Based Encryption Supporting Direct Revocation

  • Xiaoxu GaoEmail author
  • Leyou Zhang
  • Gongcheng Hu
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1105)

Abstract

Leakage-resilient ciphertext-policy attribute-based encryption (LR-CP-ABE) is an important tool to achieve fine-grained access control of data and resist side-channel attacks. Privacy protection and user revocation are two practical problems it faces. However, most of the existing schemes fail to achieve user revocation while protecting user’s privacy at present. To address the above problems, we propose an anonymous LR-CP-ABE scheme with user revocation in this paper, which is proven to be adaptively secure in the standard model under four static assumptions over composite order group. Furthermore, we also show the proposed scheme achieves the receivers anonymity which protects the users’ privacy. The performance analyses confirm the feasibility of the proposed scheme.

Keywords

Anonymous Ciphertext-policy attribute-based encryption Direct revocation Leakage-resilient 

References

  1. 1.
    Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457–473. ACM, Aarhus (2005)Google Scholar
  2. 2.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334. IEEE, Berkeley (2007)Google Scholar
  3. 3.
    Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine grained access control of encrypted data. In: 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM, Alexandria (2006)Google Scholar
  4. 4.
    Yu, S., Wang, C., Ren, K., et al.: Attribute based data sharing with attribute revocation. In: 5th ACM Symposium on Information, Computer and Communications Security, pp. 261–270. ACM, Beijing (2010)Google Scholar
  5. 5.
    Liang, X., Lu, R., Lin, X., et al.: Ciphertext policy attribute based encryption with efficient revocation (2010)Google Scholar
  6. 6.
    Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214–1221 (2011)CrossRefGoogle Scholar
  7. 7.
    Zhang, Y., Chen, X., Li, J., et al.: FDR-ABE: attribute-Based encryption with flexible and direct revocation. In: 5th International Conference on Intelligent Networking and Collaborative Systems, pp. 38–45. IEEE, Xi’an (2013)Google Scholar
  8. 8.
    Xie, X., Ma, H., Li, J., et al.: An efficient ciphertext-policy attribute-based access control towards revocation in cloud computing. J. UCS 19(16), 2349–2367 (2013)Google Scholar
  9. 9.
    Naruse, T., Mohri, M., Shiraishi, Y.: Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating. Hum.-Centric Comput. Inf. Sci. 5(1), 1–13 (2015)CrossRefGoogle Scholar
  10. 10.
    Kapadia, A., Tsang, P., Smith, S.M.: Attribute-based publishing with hidden credentials and hidden policies. NDSS 7, 179–192 (2007)Google Scholar
  11. 11.
    Katz, J., Sahai, A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: 27th Annual International Conference on Advances in Cryptology, pp. 146–162. ACM, Istanbul (2008)Google Scholar
  12. 12.
    Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: 6th International Conference on Applied Cryptography and Network Security, pp. 111–129. ACM, New York (2008)Google Scholar
  13. 13.
    Li, J., Ren, K., Zhu, B., et al.: Privacy-aware attribute-based encryption with user accountability. In: 12th International Conference on Information Security, pp. 347–362. ACM, Pisa (2009)Google Scholar
  14. 14.
    Han, F., Qin, J., Zhao, H., et al.: A general transformation from KP-ABE to searchable encryption. Future Gener. Comput. Syst. 30(1), 107–115 (2014)CrossRefGoogle Scholar
  15. 15.
    Zhang, Y., Chen, X., Li, J., et al.: Anonymous attribute-based encryption supporting efficient decryption test. In: 8th ACM SIGSAC symposium on Information, Computer and Communications Security, pp. 511–516. ACM, Hangzhou (2013)Google Scholar
  16. 16.
    Chaudhari, P., Das, M.L., Mathuria, A.: On anonymous attribute based encryption. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2015. LNCS, vol. 9478, pp. 378–392. Springer, Cham (2015).  https://doi.org/10.1007/978-3-319-26961-0_23CrossRefGoogle Scholar
  17. 17.
    Zhang, Y., Zheng, D.: Anonymous attribute-based encryption with large universe and threshold access structures. In: IEEE International Conference on Computational Science and Engineering and IEEE International Conference on Embedded and Ubiquitous Computing, pp. 870–874. IEEE, Guangzhou (2017)Google Scholar
  18. 18.
    Zhang, L., Cui, Y., Mu, Y.: Improving privacy-preserving CP-ABE with hidden access policy. In: Sun, X., Pan, Z., Bertino, E. (eds.) ICCCS 2018. LNCS, vol. 11065, pp. 596–605. Springer, Cham (2018).  https://doi.org/10.1007/978-3-030-00012-7_54CrossRefGoogle Scholar
  19. 19.
    Zhang, L., Hu, G., Mu, Y., et al.: Hidden ciphertext policy attribute-based encryption with fast decryption for personal health record system. IEEE Access 7, 33202–33213 (2019)CrossRefGoogle Scholar
  20. 20.
    Lewko, A., Rouselakis, Y., Waters, B.: Achieving leakage resilience through dual system encryption. In: 8th Conference on Theory of Cryptography, pp. 70–88. ACM (2011)Google Scholar
  21. 21.
    Zhang, M., Shi, W., Wang, C., Chen, Z., Mu, Y.: Leakage-resilient attribute-based encryption with fast decryption: models, analysis and constructions. In: Deng, R.H., Feng, T. (eds.) ISPEC 2013. LNCS, vol. 7863, pp. 75–90. Springer, Heidelberg (2013).  https://doi.org/10.1007/978-3-642-38033-4_6CrossRefGoogle Scholar
  22. 22.
    Zhang, M.: New model and construction of ABE: achieving key resilient-leakage and attribute direct-revocation. In: Susilo, W., Mu, Y. (eds.) ACISP 2014. LNCS, vol. 8544, pp. 192–208. Springer, Cham (2014).  https://doi.org/10.1007/978-3-319-08344-5_13CrossRefGoogle Scholar
  23. 23.
    Wang, Z., Yiu, S.M.: Attribute-based encryption resilient to auxiliary input. In: Au, M.-H., Miyaji, A. (eds.) ProvSec 2015. LNCS, vol. 9451, pp. 371–390. Springer, Cham (2015).  https://doi.org/10.1007/978-3-319-26059-4_21CrossRefGoogle Scholar
  24. 24.
    Zhang, L., Zhang, J., Hu, Y.: Attribute-based encryption resilient to continual auxiliary leakage with constant size ciphertexts. J. China Univ. Posts Telecommun. 23(3), 18–28 (2016)CrossRefGoogle Scholar
  25. 25.
    Yu, Q., Li, J.: Continuous leakage resilient ciphertext-policy attribute-based encryption supporting attribute revocation. Comput. Eng. Appl. 52(20), 29–38 (2016)Google Scholar
  26. 26.
    Zhang, L., Zhang, J., Mu, Y.: Novel leakage-resilient attribute-based encryption from hash proof system. Comput. J. 60(4), 541–554 (2017)Google Scholar
  27. 27.
    Zhang, J., Zhang, L.: Anonymous CP-ABE against side-channel attacks in cloud computing. J. Inf. Sci. Eng. 33(3), 789–805 (2017)MathSciNetGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.School of Mathematics and StatisticsXidian UniversityXi’anChina

Personalised recommendations