Revocable Key-policy Attribute-based Encryption Scheme with Two Revocation Lists
WANG Shangping①② YU Xiaojuan① ZHANG Yaling②
①(School of Sciences, Xi’an University of Technology, Xi’an 710054, China) ②(Shaanxi Key Laboratory for Network Computing and Security Technology, Xi’an 710048, China)
Revocable attribute-based encryption is an extension and generalization of attribute-based encryption. In this paper, a revocable key-policy attribute-based encryption scheme is constructed with two revocation lists, it extends a previous scheme which is designed with only one attribute revocation list, and in the new scheme two attribute revocation lists are involved, and the two lists are independent with each other. What’s more, the new scheme enjoys an important property that the trace algorithm return the user associated with this decryption key. Finally, under the assumption of decisional Bilinear Diffie-Hellman Exponent (BDHE), the proposed scheme is proved that is secure in the selective security model.
SAHAI A and WATERS B. Fuzzy identity-based encryption [J]. Lecture Notes in Computer Science, 2005, 3494: 457-473. doi: 10.1007/11426639_27.
[2]
YU S, WANG C, REN K, et al. Attribute based data sharing with attribute revocation[C]. ACM Symposium on Information, ACM, 2010: 261-270. doi: 10.1145/1755688. 1755720.
[3]
PIRRETTI M, TRAYNOR P, MCDANIEL P, et al. Secure attribute-based systems[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, 2006: 99-112.
[4]
BOLDYREVA A, GOYAL V, and KUMAR V. Identity- based encryption with efficient revocation[C]. Proceedings of the 15th ACM Conference on Computer and Communications Security, New York, 2008: 417-426.
[5]
HINEK M J, JIANG S, SAFAVI-NAINI R, et al. Attribute- based encryption with key cloning protection[J]. Bulletin of the Korean Mathematical Society, 2008, 2008(4): 803-819.
[6]
LI J, REN K, and KIM K. A2BE: Accountable attribute- based encryption for abuse free access control[J]. IACR Cryptology ePrint Archive, 2009: 118.
[7]
ATTRAPADUNG N and IMAI H. Conjunctive broadcast and attribute-based encryption[C]. Lecture Notes in Computer Science, 2009, 5671: 248-265. doi: 10.1007/ 978-3-642-03298-1_16.
[8]
LEWKO A, OKAMOTO T, SAHAI A, et al. Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption[C]. Advances in Cryptology-EUROCRYPT 2010, Springer Berlin Heidelberg, 2010, 6110: 62-91. doi: 10.1007/978-3-642-13190-5_4.
[9]
VLADIMIR B, DANIEL S, STEINWANDT R, et al. Multi-authority attribute-based encryption with honest-but- curious central authority[J]. International Journal of Computer Mathematics, 2011, 89(3): 268-283.
[10]
LI Q, FENG D, and ZHANG L. An attribute based encryption scheme with fine-grained attribute revocation[C]. Global Communications Conference (GLOBECOM), 2012 IEEE, Anaheim, CA, 2012: 885-890. doi: 10.1109/ GLOCOM. 2012.6503225.
ZHANG Yanhua, HU Yupu, JIANG Mingming et al. A lattice-based revocable adaptive-ID secure encryption scheme [J]. Journal of Electronics & Information Technology, 2015, 37(2): 423-428. doi: 10.11999/JEIT140421.
[12]
LI Yang, ZHU Jianming, WANG Xiuli, et al. Optimized ciphertext-policy attribute-based encryption with efficient revocation[J]. International Journal of Security and Its Applications, 2013, 7(6): 385-394.
ZHANG Yinghui, ZHENG Dong, LI Jin, et al. Attribute directly-revocable attribute-based encryption with constant ciphertext length[J]. Journal of Cryptologic Research, 2014, 1(5): 465-480.
[14]
VANCE A, LOWRY P B, and EGGETT D. A new approach to the problem of access policy violations: Increasing perceptions of accountability through the user interface[J]. MIS Quarterly, 2015, 39(2): 345-366.
[15]
CL?MENTINE G, SUSILO W, and PLANTARD T. Efficient File Sharing in Electronic Health Records [M].?Information Security Practice and Experience. Springer International Publishing, 2015: 499-513.
WEI Jianghong, HU Xuexian, and LIU Wenfen. Attribute- based authenticated key exchange protocol in multiple attribute authorities environment[J]. Journal of Electronics & Information Technology, 2012, 34(2): 451-456. doi: 10.3724/ SP.J.1146.2011.00701.