• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Gao Jiaxin, Sun Jiameng, Qin Jing. Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation[J]. Journal of Computer Research and Development, 2019, 56(10): 2160-2169. DOI: 10.7544/issn1000-1239.2019.20190323
Citation: Gao Jiaxin, Sun Jiameng, Qin Jing. Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation[J]. Journal of Computer Research and Development, 2019, 56(10): 2160-2169. DOI: 10.7544/issn1000-1239.2019.20190323

Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation

More Information
  • Published Date: September 30, 2019
  • Attribute-based encryption (ABE) is a new type of public key encryption method that can implement fine-grained access control on data in cloud servers, but the computational overhead of key distribution, data encryption and data decryption processes in attribute-based encryption is too expensive, which causes a large computational burden on the user with limited computing resources. In order to solve this problem, this paper constructs an attribute-based encryption scheme which supports key attribute revocation, outsource key distribution and data decryption work to the cloud server, at the same time, the proposed scheme can verify the correctness of outsourcing computation by using Hash functions; the scheme uses online/offline encryption and transfers lots of computation to the offline, which can effectively protect the privacy of user data, reduce the amount of user computing, and promote the operation efficiency of the solution; in addition, we use the tree access policy to provide more fine-grained access control; and the method of re-encryption realizes fine-grained attribute revocation, revoking a single attribute indirectly by generating a re-encryption key to update attributes and ciphertext; Finally, the user identity is embedded into the key to achieve the user traceability property. The proposed scheme is proved to be indistinguishable against chosen-plaintext attack(IND-CPA) security under the standard model.
  • Related Articles

    [1]Zeng Weixin, Zhao Xiang, Tang Jiuyang, Tan Zhen, Wang Wei. Iterative Entity Alignment via Re-Ranking[J]. Journal of Computer Research and Development, 2020, 57(7): 1460-1471. DOI: 10.7544/issn1000-1239.2020.20190643
    [2]Dai Chenchao, Wang Hongyuan, Ni Tongguang, Chen Shoubing. Person Re-Identification Based on Deep Convolutional Generative Adversarial Network and Expanded Neighbor Reranking[J]. Journal of Computer Research and Development, 2019, 56(8): 1632-1641. DOI: 10.7544/issn1000-1239.2019.20190195
    [3]Du Ruizhong, Li Mingyue, Tian Junfeng. Multi-keyword Ranked Ciphertext Retrieval Scheme Based on Clustering Index[J]. Journal of Computer Research and Development, 2019, 56(3): 555-565. DOI: 10.7544/issn1000-1239.2019.20170830
    [4]Guo Jiafeng, Fan Yixing. Exploration on Neural Information Retrieval Framework[J]. Journal of Computer Research and Development, 2018, 55(9): 1987-1999. DOI: 10.7544/issn1000-1239.2018.20180133
    [5]Zhong Qi, Wang Jing, Guan Xuetao, Huang Tao, Wang Keyi. Data Object Scale Aware Rank-Level Memory Allocation[J]. Journal of Computer Research and Development, 2014, 51(3): 672-680.
    [6]Liu Xiping, Wan Changxuan, and Liu Dexi. Effective XML Vague Content and Structure Retrieval and Scoring[J]. Journal of Computer Research and Development, 2010, 47(6): 1070-1078.
    [7]Xu Cunlu, Chen Yanqiu, Lu Hanqing. Statistical Landscape Features for Texture Retrieval[J]. Journal of Computer Research and Development, 2006, 43(4): 702-707.
    [8]Xing Qiang, Yuan Baozong, and Tang Xiaofang. A Fast Image Retrieval Method Based on Weighted Chromaticity Histogram[J]. Journal of Computer Research and Development, 2005, 42(11): 1903-1910.
    [9]Ru Liyun, Ma Shaoping, and Lu Jing. Feature Fusion Based on the Average Precision in Image Retrieval[J]. Journal of Computer Research and Development, 2005, 42(9): 1640-1646.
    [10]Zhang Min, Lin Chuan, and Ma Shaoping. Dynamic Parameter Learning Approach for Information Retrieval with Genetic Algorithm[J]. Journal of Computer Research and Development, 2005, 42(3).

Catalog

    Article views (1161) PDF downloads (320) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return