About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Big Data Technologies and Applications. 13th EAI International Conference, BDTA 2023, Edinburgh, UK, August 23-24, 2023, Proceedings

Research Article

Revocable Attribute-Based Encryption Scheme with Cryptographic Reverse Firewalls

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-52265-9_6,
        author={Yang Zhao and Xing-Yu Ke and Yu-Wei Pang and Hu Xiong and Guo-Bin Zhu and Kuo-Hui Yeh},
        title={Revocable Attribute-Based Encryption Scheme with Cryptographic Reverse Firewalls},
        proceedings={Big Data Technologies and Applications. 13th EAI International Conference, BDTA 2023, Edinburgh, UK, August 23-24, 2023, Proceedings},
        proceedings_a={BDTA},
        year={2024},
        month={1},
        keywords={Attribute-based Encryption Attributes revocation Partial Hidden policy Cryptographic Reverse Firewalls Data sharing},
        doi={10.1007/978-3-031-52265-9_6}
    }
    
  • Yang Zhao
    Xing-Yu Ke
    Yu-Wei Pang
    Hu Xiong
    Guo-Bin Zhu
    Kuo-Hui Yeh
    Year: 2024
    Revocable Attribute-Based Encryption Scheme with Cryptographic Reverse Firewalls
    BDTA
    Springer
    DOI: 10.1007/978-3-031-52265-9_6
Yang Zhao1, Xing-Yu Ke1, Yu-Wei Pang1, Hu Xiong1, Guo-Bin Zhu1, Kuo-Hui Yeh2,*
  • 1: School of Information and Software Engineering, University of Electronic Science and Technology of China
  • 2: Department of Information Management
*Contact email: khyeh@gms.ndhu.edu.tw

Abstract

With the prevalence of information sharing, preserving the confidentiality of sensitive data has become paramount. Attribute-based encryption (ABE) has become a viable option to tackle this problem. Using a set of attributes, data owners can encrypt data with ABE, and data is only accessible by users with the required attributes and authorization. However, there are various limitations associated with the traditional CP-ABE scheme, such as embedding user-sensitive information in the access structures without any hidden operations, an inability to effectively address the issue of user attribute changes, and vulnerability to internal attacks from cryptography devices. To address these limitations, researchers have proposed various enhanced ABE schemes. Mironov presented a concept of cryptographic reverse firewall (CRF) in Eurocrypt 2015, which could resist certain compromised machines from leaking secret information. The CRF has been deployed in many cryptographic systems, but its application in the ABE field has been relatively limited. This paper presents a novel attribute-based encryption scheme which incorporates attribute revocation, hidden policy components, and CRF mechanism to prevent attackers from internal attacks on cryptography devices. This scheme is applicable in various applications, such as cloud computing, where secure data sharing is required.

Keywords
Attribute-based Encryption Attributes revocation Partial Hidden policy Cryptographic Reverse Firewalls Data sharing
Published
2024-01-31
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-52265-9_6
Copyright © 2023–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL