Skip to main content

A Provable and User Revocable Ciphertext-Policy Attribute-Based Encryption with Updatable Ciphertext

  • Conference paper
  • First Online:
Innovations in Computer Science and Engineering

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 32))

Abstract

Attribute-based encryption (ABE) is one of most favorable tools that enable fine-grained data access control and ensure confidentiality. In our work, we mainly concentrate on Ciphertext-Policy ABE which is viewed to be one of the nearly efficient technologies for data access control as the encryptor is much intelligent to determine who may or may not have access to data encrypted by him as the access control policy lies within the ciphertext. We also illustrate the concept of revocation which corresponds to one of the most sensitive issues in ABE. We give a concrete construction of CP-ABE and prove that our scheme is Chosen-Plaintext Attack (CPA) secured under the Decisional Bilinear Diffie–Hellman assumption (DBDH). We also give the ciphertext updation for the revocation of user along with its security proof.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Boneh D; Franklin M; (2001), Identity-Based Encryption from the weil pairing, In CRYPTO volume 2139 of LNCS Springer-Verlag pp. 213–229.

    Google Scholar 

  2. Sahai A; Waters B; (2005), Fuzzy Identity-Based Encryption, EUROCRYPT, pp. 457–473.

    Google Scholar 

  3. Goyal V; Pandey O; Sahai A; Waters B; (2006), Attribute-based encryption for fine-grained access control of encrypted data, ACM Conference on Computer and Communications Security, pp. 89–98.

    Google Scholar 

  4. Bethencourt J; Sahai A; Waters B; (2007), Ciphertext-policy attribute-based encryption, IEEE Symposium on Security and Privacy, pp. 321–334.

    Google Scholar 

  5. Cheung L; Newport C; (2007), Provably Secure Ciphertext Policy ABE, ACM Conference on Computer and Communications Security, pp. 456–465.

    Google Scholar 

  6. Waters B; (2011), Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, Public Key Cryptography, pp. 53–70.

    Google Scholar 

  7. Balu A; Kuppusamy K; (2013), An expressive and provably secure ciphertext-policy attribute-based encryption, Information Sciences 276, pp. 354–362.

    Google Scholar 

  8. Boldyreva A; Goyal V; Kumar V; (2008), Identity-based encryption with efficient revocation, ACM Conference on Computer and Communications Security, pp. 417–426.

    Google Scholar 

  9. Attrapadung N; Imai H; (2009), Conjunctive broadcast and attribute-based encryption, LNCS volume 5671 Springer-Verlag, pp. 248–265.

    Google Scholar 

  10. Attrapadung N; Imai H; (2009), Attribute-based encryption supporting direct/indirect revocation modes, Cryptography and Coding LNCS volume 5921 Springer-Verlag, pp. 278–300.

    Google Scholar 

  11. Shi Y; Zheng Q; Liu J; Han Z; (2015), Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation, Information Sciences 295, pp. 221–231.

    Google Scholar 

  12. Zhang P; Chen Z; Liang K; Wang S; Wang T; (2016), A Cloud-Based Access Control Scheme with User Revocation and Attribute Update, LNCS volume 9722 Springer, pp. 525–540.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Humera Aqeel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aqeel, H., Ali, S.T. (2019). A Provable and User Revocable Ciphertext-Policy Attribute-Based Encryption with Updatable Ciphertext. In: Saini, H., Sayal, R., Govardhan, A., Buyya, R. (eds) Innovations in Computer Science and Engineering. Lecture Notes in Networks and Systems, vol 32. Springer, Singapore. https://doi.org/10.1007/978-981-10-8201-6_44

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8201-6_44

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8200-9

  • Online ISBN: 978-981-10-8201-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics