Attribute based encryption is an effective method which can solve the access control problem of cloud storage. Realizing both efficient attributes revocation and outsourcing decryption would enhance mobile user experience. In this paper, we present a new scheme of Key-Policy Attribute Based Encryption in hybrid cloud system. In our scheme, the most of computation in the decryption process can be outsourced to the cloud and the efficiency of system is improved. In addition, the attributes of malicious users or expired ones can be revoked with unrelated users offline. Moreover system consumes a little resources rather than rebuilds the system or updates all data immediately. We also give a proof of security, a detailed description of execution and efficiency analysis.
This is a preview of subscription content, log in to check access.
Buy single article
Instant access to the full article PDF.
Price includes VAT for USA
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
This is the net price. Taxes to be calculated in checkout.
Beimel, A. (1996). Secure schemes for secret sharing and key distribution. Doctoral dissertation, Technion-Israel Institute of Technology, Faculty of Computer Science.
Bethencourt, J., Sahai, A., & Waters, B. (2007, May). Ciphertext-policy attribute-based encryption. In 2007 IEEE symposium on security and privacy (SP'07) (pp. 321–334). IEEE.
Boneh, D., & Franklin, M. (2001, August). Identity-based encryption from the Weil pairing. In Annual international cryptology conference (pp. 213–229). Berlin, Heidelberg: Springer.
Green, M., Hohenberger, S., & Waters, B. (2011, August). Outsourcing the decryption of abe ciphertexts. In USENIX security symposium (Vol. 2011, No. 3).
Hur, J., & Noh, D. K. (2011). Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Transactions on Parallel and Distributed Systems, 22(7), 1214–1221.
Lai, J., Deng, R. H., Guan, C., & Weng, J. (2013). Attribute-based encryption with verifiable outsourced decryption. IEEE Transactions on Information Forensics and Security, 8(8), 1343–1354.
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., & Waters, B. (2010, May). Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 62–91). Berlin, Heidelberg: Springer.
Liang, X., Lu, R., Lin, X., & Shen, X. S. (2010). Ciphertext policy attribute based encryption with efficient revocation. Technical Report, University of Waterloo.
Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems, 24(1), 131–143.
Pirretti, M., Traynor, P., McDaniel, P., & Waters, B. (2010). Secure attribute-based systems. Journal of Computer Security, 18(5), 799–837.
Rouselakis, Y., & Waters, B. (2012). New constructions and proof methods for large universe attribute-based encryption. IACR Cryptology ePrint Archive, 2012, 583.
Shoup, V. (1997, May). Lower bounds for discrete logarithms and related problems. In International Conference on the Theory and Applications of Cryptographic Techniques (pp. 256–266). Berlin, Heidelberg: Springer.
Sahai, A., & Waters, B. (2005, May). Fuzzy identity-based encryption. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 457-473). Berlin, Heidelberg: Springer.
Singhal, M., Chandrasekhar, S., Ge, T., Sandhu, R., Krishnan, R., Ahn, G. J., et al. (2013). Collaboration in multicloud computing environments: Framework and security issues. Computer, 2, 76–84.
Waters, B. (2011, March). Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In International Workshop on Public Key Cryptography (pp. 53–70). Berlin, Heidelberg: Springer.
Yang, K., & Jia, X. (2012, June). Attributed-based access control for multi-authority systems in cloud storage. In 2012 IEEE 32nd International Conference on Distributed Computing Systems (pp. 536–545). IEEE.
Yang, K., Jia, X., Ren, K., Zhang, B., & Xie, R. (2013). DAC-MACS: Effective data access control for multiauthority cloud storage systems. IEEE Transactions on Information Forensics and Security, 8(11), 1790–1801.
Yu, S., Wang, C., Ren, K., & Lou, W. (2010, April). Attribute based data sharing with attribute revocation. In Proceedings of the 5th ACM symposium on information, computer and communications security (pp. 261–270).
This work is supported by NSFC (Grant no. 61502044).
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About this article
Cite this article
Zhang, S., Li, W., Wen, Q. et al. A Flexible KP-ABE Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation. Wireless Pers Commun (2020). https://doi.org/10.1007/s11277-020-07503-y
- Attribute-based encryption
- Decryption outsourcing
- Attribute revocation