Premium
Multi‐authority attribute‐based encryption scheme with constant‐size ciphertexts and user revocation
Author(s) -
Zhang Xiao,
Wu Faguo,
Yao Wang,
Wang Zhao,
Wang Wenhua
Publication year - 2018
Publication title -
concurrency and computation: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.309
H-Index - 67
eISSN - 1532-0634
pISSN - 1532-0626
DOI - 10.1002/cpe.4678
Subject(s) - revocation , attribute based encryption , encryption , computer science , ciphertext , computer security , key escrow , access control , semantic security , scheme (mathematics) , collusion , standard model (mathematical formulation) , theoretical computer science , public key cryptography , mathematics , gauge (firearms) , business , mathematical analysis , archaeology , industrial organization , overhead (engineering) , history , operating system
Summary Ciphertext‐policy attribute‐based encryption (CP‐ABE) is regarded as one of the most suitable technologies for data access control in cloud storage system. It gives data owners direct and flexible control on access policies. However, there still exists practicality concerns in CP‐ABE applications, for example, the key escrow problem, user revocability, and large ciphertext size. Considering these problems, we propose a multi‐authority attribute‐based encryption scheme with constant‐size ciphertexts and user revocation for threshold access policy in this paper. The security proof shows that the proposed scheme is selectively secure under the augmented multi‐sequence of exponents decisional Diffie‐Hellman assumption, and it also achieves forward security, backward security, and collusion‐resistance.