Skip to main content

Anonymous Leakage-Resilient Ciphertext-Policy Attribute-Based Encryption Supporting Direct Revocation

  • Conference paper
  • First Online:
Frontiers in Cyber Security (FCS 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1105))

Included in the following conference series:

  • 505 Accesses

Abstract

Leakage-resilient ciphertext-policy attribute-based encryption (LR-CP-ABE) is an important tool to achieve fine-grained access control of data and resist side-channel attacks. Privacy protection and user revocation are two practical problems it faces. However, most of the existing schemes fail to achieve user revocation while protecting user’s privacy at present. To address the above problems, we propose an anonymous LR-CP-ABE scheme with user revocation in this paper, which is proven to be adaptively secure in the standard model under four static assumptions over composite order group. Furthermore, we also show the proposed scheme achieves the receivers anonymity which protects the users’ privacy. The performance analyses confirm the feasibility of the proposed scheme.

Supported by the National Cryptography Development Fund under grant (MMJJ20180209).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457–473. ACM, Aarhus (2005)

    Google Scholar 

  2. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334. IEEE, Berkeley (2007)

    Google Scholar 

  3. Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine grained access control of encrypted data. In: 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM, Alexandria (2006)

    Google Scholar 

  4. Yu, S., Wang, C., Ren, K., et al.: Attribute based data sharing with attribute revocation. In: 5th ACM Symposium on Information, Computer and Communications Security, pp. 261–270. ACM, Beijing (2010)

    Google Scholar 

  5. Liang, X., Lu, R., Lin, X., et al.: Ciphertext policy attribute based encryption with efficient revocation (2010)

    Google Scholar 

  6. Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214–1221 (2011)

    Article  Google Scholar 

  7. Zhang, Y., Chen, X., Li, J., et al.: FDR-ABE: attribute-Based encryption with flexible and direct revocation. In: 5th International Conference on Intelligent Networking and Collaborative Systems, pp. 38–45. IEEE, Xi’an (2013)

    Google Scholar 

  8. Xie, X., Ma, H., Li, J., et al.: An efficient ciphertext-policy attribute-based access control towards revocation in cloud computing. J. UCS 19(16), 2349–2367 (2013)

    Google Scholar 

  9. Naruse, T., Mohri, M., Shiraishi, Y.: Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating. Hum.-Centric Comput. Inf. Sci. 5(1), 1–13 (2015)

    Article  Google Scholar 

  10. Kapadia, A., Tsang, P., Smith, S.M.: Attribute-based publishing with hidden credentials and hidden policies. NDSS 7, 179–192 (2007)

    Google Scholar 

  11. Katz, J., Sahai, A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: 27th Annual International Conference on Advances in Cryptology, pp. 146–162. ACM, Istanbul (2008)

    Google Scholar 

  12. Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: 6th International Conference on Applied Cryptography and Network Security, pp. 111–129. ACM, New York (2008)

    Google Scholar 

  13. Li, J., Ren, K., Zhu, B., et al.: Privacy-aware attribute-based encryption with user accountability. In: 12th International Conference on Information Security, pp. 347–362. ACM, Pisa (2009)

    Google Scholar 

  14. Han, F., Qin, J., Zhao, H., et al.: A general transformation from KP-ABE to searchable encryption. Future Gener. Comput. Syst. 30(1), 107–115 (2014)

    Article  Google Scholar 

  15. Zhang, Y., Chen, X., Li, J., et al.: Anonymous attribute-based encryption supporting efficient decryption test. In: 8th ACM SIGSAC symposium on Information, Computer and Communications Security, pp. 511–516. ACM, Hangzhou (2013)

    Google Scholar 

  16. Chaudhari, P., Das, M.L., Mathuria, A.: On anonymous attribute based encryption. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2015. LNCS, vol. 9478, pp. 378–392. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-26961-0_23

    Chapter  Google Scholar 

  17. Zhang, Y., Zheng, D.: Anonymous attribute-based encryption with large universe and threshold access structures. In: IEEE International Conference on Computational Science and Engineering and IEEE International Conference on Embedded and Ubiquitous Computing, pp. 870–874. IEEE, Guangzhou (2017)

    Google Scholar 

  18. Zhang, L., Cui, Y., Mu, Y.: Improving privacy-preserving CP-ABE with hidden access policy. In: Sun, X., Pan, Z., Bertino, E. (eds.) ICCCS 2018. LNCS, vol. 11065, pp. 596–605. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-00012-7_54

    Chapter  Google Scholar 

  19. Zhang, L., Hu, G., Mu, Y., et al.: Hidden ciphertext policy attribute-based encryption with fast decryption for personal health record system. IEEE Access 7, 33202–33213 (2019)

    Article  Google Scholar 

  20. Lewko, A., Rouselakis, Y., Waters, B.: Achieving leakage resilience through dual system encryption. In: 8th Conference on Theory of Cryptography, pp. 70–88. ACM (2011)

    Google Scholar 

  21. Zhang, M., Shi, W., Wang, C., Chen, Z., Mu, Y.: Leakage-resilient attribute-based encryption with fast decryption: models, analysis and constructions. In: Deng, R.H., Feng, T. (eds.) ISPEC 2013. LNCS, vol. 7863, pp. 75–90. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38033-4_6

    Chapter  Google Scholar 

  22. Zhang, M.: New model and construction of ABE: achieving key resilient-leakage and attribute direct-revocation. In: Susilo, W., Mu, Y. (eds.) ACISP 2014. LNCS, vol. 8544, pp. 192–208. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-08344-5_13

    Chapter  Google Scholar 

  23. Wang, Z., Yiu, S.M.: Attribute-based encryption resilient to auxiliary input. In: Au, M.-H., Miyaji, A. (eds.) ProvSec 2015. LNCS, vol. 9451, pp. 371–390. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-26059-4_21

    Chapter  Google Scholar 

  24. Zhang, L., Zhang, J., Hu, Y.: Attribute-based encryption resilient to continual auxiliary leakage with constant size ciphertexts. J. China Univ. Posts Telecommun. 23(3), 18–28 (2016)

    Article  Google Scholar 

  25. Yu, Q., Li, J.: Continuous leakage resilient ciphertext-policy attribute-based encryption supporting attribute revocation. Comput. Eng. Appl. 52(20), 29–38 (2016)

    Google Scholar 

  26. Zhang, L., Zhang, J., Mu, Y.: Novel leakage-resilient attribute-based encryption from hash proof system. Comput. J. 60(4), 541–554 (2017)

    Google Scholar 

  27. Zhang, J., Zhang, L.: Anonymous CP-ABE against side-channel attacks in cloud computing. J. Inf. Sci. Eng. 33(3), 789–805 (2017)

    MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoxu Gao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gao, X., Zhang, L., Hu, G. (2019). Anonymous Leakage-Resilient Ciphertext-Policy Attribute-Based Encryption Supporting Direct Revocation. In: Shen, B., Wang, B., Han, J., Yu, Y. (eds) Frontiers in Cyber Security. FCS 2019. Communications in Computer and Information Science, vol 1105. Springer, Singapore. https://doi.org/10.1007/978-981-15-0818-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0818-9_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0817-2

  • Online ISBN: 978-981-15-0818-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics