Journal on Communications ›› 2018, Vol. 39 ›› Issue (11): 63-69.doi: 10.11959/j.issn.1000-436x.2018231

• Papers • Previous Articles     Next Articles

Revocable and traceable key-policy attribute-based encryption scheme

Fang QI,Yanmei LI(),Zhe TANG   

  1. School of Information Science and Engineering,Central South University,Changsha 410083,China
  • Revised:2018-05-19 Online:2018-11-01 Published:2018-12-10
  • Supported by:
    The National Natural Science Foundation of China(61632009);The Science and Technology Project of Changsha(kq1701089);The National Key Research and Development Program of China(2018YFD0700500)

Abstract:

The existing key-policy attribute-based encryption (KP-ABE) scheme can not balance the problem of attribute revocation and user identity tracking.Hence,a KP-ABE scheme which supported revocable and traceable was proposed.The scheme could revoke the user attributes without updating the system public key and user private key with a less update cost.Meanwhile,it could trace the user identity based on decryption key which could effectively prevent anonymous user key leakage problem.The proposed scheme was based on linear secret sharing scheme (LSSS),which was more efficient than tree-based access structure.Based on the deterministic q-BDHE hypothesis,the proposed scheme gave security proof until standard mode.Finally,compared with the existing KP-ABE scheme,the scheme has a shorter public key length,lower computational overhead and realizes the traceability function of user identity based on the revocable attribute,which has obvious advantages.

Key words: KP-ABE, revocable, traceable, linear secret sharing scheme

CLC Number: 

No Suggested Reading articles found!