Abstract
Attribute-based encryption (ABE) is one of most favorable tools that enable fine-grained data access control and ensure confidentiality. In our work, we mainly concentrate on Ciphertext-Policy ABE which is viewed to be one of the nearly efficient technologies for data access control as the encryptor is much intelligent to determine who may or may not have access to data encrypted by him as the access control policy lies within the ciphertext. We also illustrate the concept of revocation which corresponds to one of the most sensitive issues in ABE. We give a concrete construction of CP-ABE and prove that our scheme is Chosen-Plaintext Attack (CPA) secured under the Decisional Bilinear Diffie–Hellman assumption (DBDH). We also give the ciphertext updation for the revocation of user along with its security proof.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Boneh D; Franklin M; (2001), Identity-Based Encryption from the weil pairing, In CRYPTO volume 2139 of LNCS Springer-Verlag pp. 213–229.
Sahai A; Waters B; (2005), Fuzzy Identity-Based Encryption, EUROCRYPT, pp. 457–473.
Goyal V; Pandey O; Sahai A; Waters B; (2006), Attribute-based encryption for fine-grained access control of encrypted data, ACM Conference on Computer and Communications Security, pp. 89–98.
Bethencourt J; Sahai A; Waters B; (2007), Ciphertext-policy attribute-based encryption, IEEE Symposium on Security and Privacy, pp. 321–334.
Cheung L; Newport C; (2007), Provably Secure Ciphertext Policy ABE, ACM Conference on Computer and Communications Security, pp. 456–465.
Waters B; (2011), Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, Public Key Cryptography, pp. 53–70.
Balu A; Kuppusamy K; (2013), An expressive and provably secure ciphertext-policy attribute-based encryption, Information Sciences 276, pp. 354–362.
Boldyreva A; Goyal V; Kumar V; (2008), Identity-based encryption with efficient revocation, ACM Conference on Computer and Communications Security, pp. 417–426.
Attrapadung N; Imai H; (2009), Conjunctive broadcast and attribute-based encryption, LNCS volume 5671 Springer-Verlag, pp. 248–265.
Attrapadung N; Imai H; (2009), Attribute-based encryption supporting direct/indirect revocation modes, Cryptography and Coding LNCS volume 5921 Springer-Verlag, pp. 278–300.
Shi Y; Zheng Q; Liu J; Han Z; (2015), Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation, Information Sciences 295, pp. 221–231.
Zhang P; Chen Z; Liang K; Wang S; Wang T; (2016), A Cloud-Based Access Control Scheme with User Revocation and Attribute Update, LNCS volume 9722 Springer, pp. 525–540.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Aqeel, H., Ali, S.T. (2019). A Provable and User Revocable Ciphertext-Policy Attribute-Based Encryption with Updatable Ciphertext. In: Saini, H., Sayal, R., Govardhan, A., Buyya, R. (eds) Innovations in Computer Science and Engineering. Lecture Notes in Networks and Systems, vol 32. Springer, Singapore. https://doi.org/10.1007/978-981-10-8201-6_44
Download citation
DOI: https://doi.org/10.1007/978-981-10-8201-6_44
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8200-9
Online ISBN: 978-981-10-8201-6
eBook Packages: EngineeringEngineering (R0)