Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (5): 39-49.doi: 10.11959/j.issn.2096-109x.2016.00055

• Papers • Previous Articles     Next Articles

Outsourced attribute-based encryption with policy update

Su-qing LIN1,2   

  1. 1 The State Key Lab of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China
    2 University of Chinese Academy of Sciences,Beijing 100049,China
  • Revised:2016-05-08 Online:2016-05-15 Published:2020-03-26
  • Supported by:
    The National Natural Science Foundation of China(61379142)

Abstract:

In order to achieve the efficient and flexible access control for the encrypted data stored in the cloud,an outsourced attribute-based encryption scheme with policy update was proposed.Based on the standard attribute-based encryption scheme,the functionality of policy update from delegation for a ciphertext without revealing any confidential information of the plaintext and private keys by utilizing the techniques of key blinding and outsourcing decryption was accomplished.Simultaneously,the decryption overhead for a user to recover the plaintext was effectively reduced.The scheme supports non-monotonic access structure and can be proved to have selective IND-CPA security and private key security under standard assumptions,respectively,in the standard model.Compared with similar schemes from literatures,the scheme provides better security and efficiency.

Key words: attribute-based encryption, outsourced decryption, policy update, private key security

CLC Number: 

No Suggested Reading articles found!