Journal on Communications ›› 2019, Vol. 40 ›› Issue (5): 47-56.doi: 10.11959/j.issn.1000-436x.2019116

• Papers • Previous Articles     Next Articles

Attribute-based encryption scheme supporting attribute revocation in cloud storage environment

Lei SUN1,Zhiyuan ZHAO2,Jianhua WANG1,Zhiqiang ZHU1   

  1. 1 The Third Institute,Strategic Support Force Information Engineering University,Zhengzhou 450001,China
    2 Troops 61516,Beijing 100062,China
  • Revised:2019-04-22 Online:2019-05-25 Published:2019-05-30
  • Supported by:
    The National Basic Research Program of China (973 Program)(2013CB338000);The National Key Research and Development Program of China(2016YFB0501900)

Abstract:

Attribute-based encryption (ABE) scheme is widely used in the cloud storage due to its fine-grained access control.Each attribute in ABE may be shared by multiple users at the same time.Therefore,how to achieve attribute-level user revocation is currently facing an important challenge.Through research,it has been found that some attribute-level user revocation schemes currently can’t resist the collusion attack between the revoked user and the existing user.To solve this problem,an attribute-based encryption scheme that supported the immediate attribute revocation was proposed.The scheme could achieve attribute-level user revocation and could effectively resist collusion attacks between the revoked users and the existing users.At the same time,this scheme outsourced complex decryption calculations to cloud service providers with powerful computing ability,which reduced the computational burden of the data user.The scheme was proved secure based on computational Diffie-Hellman assumption in the standard model.Finally,the functionality and efficiency of the proposed scheme were analyzed and verified.The experimental results show that the proposed scheme can safely implement attribute-level user revocation and has the ability to quickly decrypt,which greatly improves the system efficiency.

Key words: cloud storage, attribute-based encryption, collusion attack, attribute revocation, outsourced decryption

CLC Number: 

No Suggested Reading articles found!