Abstract
Leakage-resilient ciphertext-policy attribute-based encryption (LR-CP-ABE) is an important tool to achieve fine-grained access control of data and resist side-channel attacks. Privacy protection and user revocation are two practical problems it faces. However, most of the existing schemes fail to achieve user revocation while protecting user’s privacy at present. To address the above problems, we propose an anonymous LR-CP-ABE scheme with user revocation in this paper, which is proven to be adaptively secure in the standard model under four static assumptions over composite order group. Furthermore, we also show the proposed scheme achieves the receivers anonymity which protects the users’ privacy. The performance analyses confirm the feasibility of the proposed scheme.
Supported by the National Cryptography Development Fund under grant (MMJJ20180209).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457–473. ACM, Aarhus (2005)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334. IEEE, Berkeley (2007)
Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine grained access control of encrypted data. In: 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM, Alexandria (2006)
Yu, S., Wang, C., Ren, K., et al.: Attribute based data sharing with attribute revocation. In: 5th ACM Symposium on Information, Computer and Communications Security, pp. 261–270. ACM, Beijing (2010)
Liang, X., Lu, R., Lin, X., et al.: Ciphertext policy attribute based encryption with efficient revocation (2010)
Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214–1221 (2011)
Zhang, Y., Chen, X., Li, J., et al.: FDR-ABE: attribute-Based encryption with flexible and direct revocation. In: 5th International Conference on Intelligent Networking and Collaborative Systems, pp. 38–45. IEEE, Xi’an (2013)
Xie, X., Ma, H., Li, J., et al.: An efficient ciphertext-policy attribute-based access control towards revocation in cloud computing. J. UCS 19(16), 2349–2367 (2013)
Naruse, T., Mohri, M., Shiraishi, Y.: Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating. Hum.-Centric Comput. Inf. Sci. 5(1), 1–13 (2015)
Kapadia, A., Tsang, P., Smith, S.M.: Attribute-based publishing with hidden credentials and hidden policies. NDSS 7, 179–192 (2007)
Katz, J., Sahai, A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: 27th Annual International Conference on Advances in Cryptology, pp. 146–162. ACM, Istanbul (2008)
Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: 6th International Conference on Applied Cryptography and Network Security, pp. 111–129. ACM, New York (2008)
Li, J., Ren, K., Zhu, B., et al.: Privacy-aware attribute-based encryption with user accountability. In: 12th International Conference on Information Security, pp. 347–362. ACM, Pisa (2009)
Han, F., Qin, J., Zhao, H., et al.: A general transformation from KP-ABE to searchable encryption. Future Gener. Comput. Syst. 30(1), 107–115 (2014)
Zhang, Y., Chen, X., Li, J., et al.: Anonymous attribute-based encryption supporting efficient decryption test. In: 8th ACM SIGSAC symposium on Information, Computer and Communications Security, pp. 511–516. ACM, Hangzhou (2013)
Chaudhari, P., Das, M.L., Mathuria, A.: On anonymous attribute based encryption. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2015. LNCS, vol. 9478, pp. 378–392. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-26961-0_23
Zhang, Y., Zheng, D.: Anonymous attribute-based encryption with large universe and threshold access structures. In: IEEE International Conference on Computational Science and Engineering and IEEE International Conference on Embedded and Ubiquitous Computing, pp. 870–874. IEEE, Guangzhou (2017)
Zhang, L., Cui, Y., Mu, Y.: Improving privacy-preserving CP-ABE with hidden access policy. In: Sun, X., Pan, Z., Bertino, E. (eds.) ICCCS 2018. LNCS, vol. 11065, pp. 596–605. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-00012-7_54
Zhang, L., Hu, G., Mu, Y., et al.: Hidden ciphertext policy attribute-based encryption with fast decryption for personal health record system. IEEE Access 7, 33202–33213 (2019)
Lewko, A., Rouselakis, Y., Waters, B.: Achieving leakage resilience through dual system encryption. In: 8th Conference on Theory of Cryptography, pp. 70–88. ACM (2011)
Zhang, M., Shi, W., Wang, C., Chen, Z., Mu, Y.: Leakage-resilient attribute-based encryption with fast decryption: models, analysis and constructions. In: Deng, R.H., Feng, T. (eds.) ISPEC 2013. LNCS, vol. 7863, pp. 75–90. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38033-4_6
Zhang, M.: New model and construction of ABE: achieving key resilient-leakage and attribute direct-revocation. In: Susilo, W., Mu, Y. (eds.) ACISP 2014. LNCS, vol. 8544, pp. 192–208. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-08344-5_13
Wang, Z., Yiu, S.M.: Attribute-based encryption resilient to auxiliary input. In: Au, M.-H., Miyaji, A. (eds.) ProvSec 2015. LNCS, vol. 9451, pp. 371–390. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-26059-4_21
Zhang, L., Zhang, J., Hu, Y.: Attribute-based encryption resilient to continual auxiliary leakage with constant size ciphertexts. J. China Univ. Posts Telecommun. 23(3), 18–28 (2016)
Yu, Q., Li, J.: Continuous leakage resilient ciphertext-policy attribute-based encryption supporting attribute revocation. Comput. Eng. Appl. 52(20), 29–38 (2016)
Zhang, L., Zhang, J., Mu, Y.: Novel leakage-resilient attribute-based encryption from hash proof system. Comput. J. 60(4), 541–554 (2017)
Zhang, J., Zhang, L.: Anonymous CP-ABE against side-channel attacks in cloud computing. J. Inf. Sci. Eng. 33(3), 789–805 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Gao, X., Zhang, L., Hu, G. (2019). Anonymous Leakage-Resilient Ciphertext-Policy Attribute-Based Encryption Supporting Direct Revocation. In: Shen, B., Wang, B., Han, J., Yu, Y. (eds) Frontiers in Cyber Security. FCS 2019. Communications in Computer and Information Science, vol 1105. Springer, Singapore. https://doi.org/10.1007/978-981-15-0818-9_2
Download citation
DOI: https://doi.org/10.1007/978-981-15-0818-9_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0817-2
Online ISBN: 978-981-15-0818-9
eBook Packages: Computer ScienceComputer Science (R0)