ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2015, Vol. 52 ›› Issue (10): 2281-2292.doi: 10.7544/issn1000-1239.2015.20150580

Special Issue: 2015网络安全与隐私保护研究进展

Previous Articles     Next Articles

A Privacy Preserving Attribute-Based Encryption Scheme with User Revocation

Li Jiguo, Shi Yuerong, Zhang Yichen   

  1. (College of Computer & Information, Hohai University, Nanjing 211100)
  • Online:2015-10-01

Abstract: Since Sahai and Waters proposed the concept of attribute-based encryption, ciphertext-policy attribute-based encryption (CP-ABE) system has drawn more and more attentions due to its widespread use of scenes. The consumption of the battery is not economical for users who use attribute-based encryption on mobile devices because of the large number of bilinear pairing operations. Due to dynamic for user’s attributes and the openness of the access structure in the cloud environment, it may lead to the attribute failure and user privacy leakage. In order to solve above problems, we construct an attribute-based encryption scheme, which protects the privacy for the users by fully hidden access structure and supports flexible user revocation by key updating mechanisms. Meanwhile, we outsource the high computational cost of the bilinear pairing operations to the cloud storage providers, which reduces the computational expense of users for mobile devices. In order to curb cloud misconduct or malicious attacks on the cloud, we provide the verification function of the converted ciphertext which ensures the converted encrypted cipher text is not replaced illegally. The proposed scheme is more suitable for secure mobile cloud applications.

Key words: attribute-based encryption system, ciphertext-policy, privacy preserving, user revocation, cloud computing

CLC Number: