Attribute-Based Access Control for Multi-Authority Systems with Constant Size Ciphertext in Cloud Computing

被引:18
作者
CHEN Yanli [1 ]
SONG Lingling [1 ]
YANG Geng [2 ]
机构
[1] College of Computer, Nanjing University of Post &Telecommunications
[2] Overseas Cooperation & Exchange Offi ce, Nanjing University of Post
关键词
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
摘要
In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption and decryption operations that depend at least linearly on the number of attributes involved in the access policy. We propose an efficient multi-authority CP-ABE scheme in which the authorities need not interact to generate public information during the system initialization phase. Our scheme has constant ciphertext length and a constant number of pairing computations. Our scheme can be proven CPA-secure in random oracle model under the decision q-BDHE assumption. When user's attributes revocation occurs, the scheme transfers most re-encryption work to the cloud service provider, reducing the data owner's computational cost on the premise of security. Finally the analysis and simulation result show that the schemes proposed in this thesis ensure the privacy and secure access of sensitive data stored in the cloud server, and be able to cope with the dynamic changes of users' access privileges in large-scale systems. Besides, the multi-authority ABE eliminates the key escrow problem, achieves the length of ciphertext optimization and enhances the effi ciency of the encryption and decryption operations.
引用
收藏
页码:146 / 162
页数:17
相关论文
共 5 条
  • [1] Attributed-based fine-grained access control with efficient revocation in cloud storage systems..Yang Kan;Jia Xiao-hua;Kui Ren;.Proceedings of the 8th ACM SIGSAC Symposium on Information;Computer and Communications Security.2013,
  • [2] Attribute-based encryption schemes with constant-size ciphertexts.[J]..Theoretical Computer Science.2011,
  • [3] Secure threshold multi authority attribute based encryption without a central authority
    Lin, Huang
    Cao, Zhenfu
    Liang, Xiaohui
    Shao, Jun
    [J]. INFORMATION SCIENCES, 2010, 180 (13) : 2618 - 2632
  • [4] Improved proxy re-encryption schemes with applications to secure distributed storage.[J].Giuseppe Ateniese;Kevin Fu;Matthew Green;Susan Hohenberger.ACM Transactions on Information and System Security (TISSEC).2006, 1
  • [5] A survey of key management for secure group communication
    Rafaeli, S
    Hutchison, D
    [J]. ACM COMPUTING SURVEYS, 2003, 35 (03) : 309 - 329