Cloud Computing, Security, Privacy in New Computing Environments. 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings

Research Article

A Revocable Outsourcing Attribute-Based Encryption Scheme

Download
221 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-69605-8_14,
        author={Zoe Jiang and Ruoqing Zhang and Zechao Liu and S. Yiu and Lucas Hui and Xuan Wang and Junbin Fang},
        title={A Revocable Outsourcing Attribute-Based Encryption Scheme},
        proceedings={Cloud Computing, Security, Privacy in New Computing Environments. 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25--26, and December 15--16, 2016, Proceedings},
        proceedings_a={CLOUDCOMP},
        year={2017},
        month={11},
        keywords={Attribute-Based Encryption Outsourced decryption Revocation Bilinear pairing},
        doi={10.1007/978-3-319-69605-8_14}
    }
    
  • Zoe Jiang
    Ruoqing Zhang
    Zechao Liu
    S. Yiu
    Lucas Hui
    Xuan Wang
    Junbin Fang
    Year: 2017
    A Revocable Outsourcing Attribute-Based Encryption Scheme
    CLOUDCOMP
    Springer
    DOI: 10.1007/978-3-319-69605-8_14
Zoe Jiang1, Ruoqing Zhang2, Zechao Liu1, S. Yiu2, Lucas Hui2,*, Xuan Wang1, Junbin Fang3
  • 1: Harbin Institute of Technology Shenzhen Graduate School
  • 2: The University of Hong Kong
  • 3: Jinan University
*Contact email: hui@cs.hku.hk

Abstract

Attribute-Based Encryption (ABE) is a generalized cryptographic primitive from normal public key encryption. It provides an access control mechanism over encrypted message using access policies and ascribed attributes. This scheme can solve the privacy issue when data is outsourced to cloud for storage well. However, there are some practical issues which must be fixed before ABE becomes applicable. One is that both the ciphertext size and the decryption time grows with the complexity of the access policy, which brings pressure to mobile devies. The other is that, from practical point of view, some users might be disabled for some attributes or be removed from the system. It demands on flexible revocation mechanism supporting both user and attribute granularities. In this research, we propose a solution adopting techniques on secure outsourcing of pairings to support outsourcing computation and adopting some techniques based on the tree-based scheme to solve user revocation and attribute revocation. We also give its security model and proof.