信息网络安全 ›› 2017, Vol. 17 ›› Issue (6): 14-21.doi: 10.3969/j.issn.1671-1122.2017.06.003

Previous Articles     Next Articles

Attribute-based Encryption Scheme Supporting Privacy Preserving and User Revocation in the Cloud Environment

YAN Xixi1, YE Qing1, LIU Yu2   

  1. 1. School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo Henan 454003, China;
    2. Information System and Security & Countermeasures Experimental Center, Beijing Institute of Technology, Beijing 100081, China;
  • Received:2017-04-03 Online:2017-06-20

Abstract: In order to support fine-grained attribute revocation and privacy preserving in data outsourcing systems, an efficient privacy preserving attribute-based encryption scheme with user revocation is proposed. In the scheme, the attribute will be divided into two parts: attribute name and attribute value. Encryptor-specified access structures is partially hidden, so the value of user’s attributes will never be revealed to any third parties, and the user’s privacy will be effectively preserved. Meanwhile, a token system is used to create key encryption key which can address the challenging issue of efficient attribute revocation. The new scheme achieved fine-grained and immediate attribute revocation which is more suitable for the practical applications. In addition, the scheme is proved to be adaptively chosen plaintext attack secure in the standard model, and it can withstand conspiracy attack. Compared to the existing related schemes, computational cost and storage cost is reduced, and it is more suitable for the practical applications in which user attributes is much less than the total of system attributes.

Key words: cloud environment, attribute-based encryption, attribute revocation, privacy preserving

CLC Number: