Advertisement

Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation

  • Gang Yu
  • Xiaoxiao Ma
  • Zhenfu Cao
  • Weihua Zhu
  • Guang Zeng
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10631)

Abstract

Ciphertext-policy attribute-based encryption (CP-ABE) is a promising primitive for enforcing access control policies defined by data owner on outsourced data. We propose a novel primitive called server-aided directly revocable CP-ABE with verifiable delegation, denoted by sarCP-ABE. In sarCP-ABE, the workloads about revocation are delegated to an aide-server, and the data owner only needs to generate a normal ciphertext as in a pure CP-ABE system. A user can be directly revoked by updating a public revocation list. To prevent a revoked user from decrypting, the aide server can update the aide-ciphertext with current revocation list, and an auditor can publicly check the correctness of the updated aide-ciphertext. At last, the proposed scheme can be proved selectively secure against chosen-plaintext attack on both original and updated ciphertext.

Keywords

ABE User revocation Verifiable revocation delegation LSSS 

Notes

Acknowledgment

This work was supported in part by the National Natural Science Foundation of China (Nos. 61602512, 61632012, 61373154, 61371083, 61672239), in part by China Postdoctoral Science Foundation of China (No. 2016M591629), in part by National Key Research and Development Program (Nos. 2016YFB0800101 and 2016YFB0800100), Innovative Research Groups of the National Natural Science Foundation of China (No. 61521003).

References

  1. 1.
    Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005).  https://doi.org/10.1007/11426639_27CrossRefGoogle Scholar
  2. 2.
    Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)Google Scholar
  3. 3.
    Pirretti, M., Traynor, P., McDaniel, P., Waters, B.: Secure attribute-based systems. In: Proceedings of the 13th ACM conference on Computer and communications security, pp. 99–112. ACM (2006)Google Scholar
  4. 4.
    Liang, X., Lu, R., Lin, X., Shen, X.: Ciphertext policy attribute based encryption with efficient revocation. Technical report, University of Waterloo (2010)Google Scholar
  5. 5.
    Ostrovsky R., Sahai A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of ACM Conference on Computer and Communication Security, pp. 195–203. ACM (2007)Google Scholar
  6. 6.
    Hur, J., Noh, D.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214–1221 (2011)CrossRefGoogle Scholar
  7. 7.
    Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 199–217. Springer, Heidelberg (2012).  https://doi.org/10.1007/978-3-642-32009-5_13CrossRefGoogle Scholar
  8. 8.
    Xie, X., Ma, H., Li, J., Chen, X.: New ciphertext-policy attribute-based access control with efficient revocation. In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds.) ICT-EurAsia 2013. LNCS, vol. 7804, pp. 373–382. Springer, Heidelberg (2013).  https://doi.org/10.1007/978-3-642-36818-9_41CrossRefGoogle Scholar
  9. 9.
    Attrapadung, N., Imai, H.: Conjunctive broadcast and attribute-based encryption. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 248–265. Springer, Heidelberg (2009).  https://doi.org/10.1007/978-3-642-03298-1_16CrossRefzbMATHGoogle Scholar
  10. 10.
    Yu, S., Wang, C., Ren, K., Lou, W.: Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 261–270. ACM (2010)Google Scholar
  11. 11.
    Jahid, S., Mittal, P., Borisov, N.: EASiER: Encryption-based access control in social networks with efficient revocation. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 411–415. ACM (2011)Google Scholar
  12. 12.
    Zhang, Y., Chen, X., Li, J., Li, H., Li, F.: FDR-ABE: attribute-based encryption with flexible and direct revocation. In: 5th International Conference on Intelligent Networking and Collaborative Systems-2013, pp. 38–45. IEEE (2013)Google Scholar
  13. 13.
    Naruse, T., Mohri, M., Shiraishi, Y.: Attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating. In: Park, J., Stojmenovic, I., Choi, M., Xhafa, F. (eds.) Future Information Technology 2014. LNEE, vol. 276, pp. 119–125. Springer, Berlin, Heidelberg (2014).  https://doi.org/10.1007/978-3-642-40861-8_18CrossRefGoogle Scholar
  14. 14.
    Shi, Y., Zheng, Q., Liu, J., Han, Z.: Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation. Inf. Sci. 295, 221–231 (2015)MathSciNetCrossRefGoogle Scholar
  15. 15.
    Cui, H., Deng, R.H., Li, Y., Qin, B.: Server-aided revocable attribute-based encryption. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9879, pp. 570–587. Springer, Cham (2016).  https://doi.org/10.1007/978-3-319-45741-3_29CrossRefGoogle Scholar
  16. 16.
    Yamada, K., Attrapadung, N., Emura, K., Hanaoka, G., Tanaka, K.: Generic constructions for fully secure revocable attribute-based encryption. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 532–551. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-66399-9_29CrossRefGoogle Scholar
  17. 17.
    Boldyreva, A., Goyal, V., Kumar, V. : Identity-based encryption with efficient revocation. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 417–426. ACM (2008)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.State Key Laboratory of Mathematical Engineering and Advanced ComputingInformation Science and Technology InstituteZhengzhouChina
  2. 2.Shanghai Key Lab for Trustworthy ComputingEast China Normal UniversityShanghaiChina
  3. 3.Zheng Zhou Vocational University of Information and TechnologyZhengzhouChina

Personalised recommendations