• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
He Qian, Liu Peng, Wang Yong. Attribute Based Encryption Method with Revocable Dynamic and Static Attributes for VANETs[J]. Journal of Computer Research and Development, 2017, 54(11): 2456-2466. DOI: 10.7544/issn1000-1239.2017.20170373
Citation: He Qian, Liu Peng, Wang Yong. Attribute Based Encryption Method with Revocable Dynamic and Static Attributes for VANETs[J]. Journal of Computer Research and Development, 2017, 54(11): 2456-2466. DOI: 10.7544/issn1000-1239.2017.20170373

Attribute Based Encryption Method with Revocable Dynamic and Static Attributes for VANETs

More Information
  • Published Date: October 31, 2017
  • The data secure sharing in vehicular ad hoc network (VANET) usually uses group encryption mode. However it is difficult to construct group and to manage group key for vehicular terminal with high mobility. Ciphertext-policy attribute-based encryption (CP-ABE) is a kind of new solution for VANETs' communication security. In the traditional CP-ABE strategy, it has several shortcomings, such as high decryption computation complex, and attributes revoking requires the re-encrypting of the whole cipher-text and the inflexible construction of access policy tree. These shortcomings lead to the limited application of CP-ABE in VANETs. In order to solve these problems, an ABE with revocable dynamic and static attributes (ABE-RDS) is proposed for the data secure sharing of cloud storage in VANETs. In the ABE-RDS, dynamic attribute and static attribute are managed separately, and combination policy tree is constructed, and main decryption part with high computation cost is delegated to servers using decryption proxy. In addition, the vehicular terminal can revoke attributes and refresh dynamic attributes through global and local trusted authority. The proposed ABE-RDS is secure, and it has superiority over traditional CP-ABE in space and time complexity. The performance of ABE-RDS in vehicular terminal decryption, attribute revocation, and system concurrent is evaluated with experiments.
  • Related Articles

    [1]Yan Xincheng, Chen Yue, Ba Yang, Jia Hongyong, Wang Zhonghui. Updatable Attribute-Based Encryption Scheme Supporting Dynamic Change of User Rights[J]. Journal of Computer Research and Development, 2020, 57(5): 1057-1069. DOI: 10.7544/issn1000-1239.2020.20190254
    [2]Gao Jiaxin, Sun Jiameng, Qin Jing. Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation[J]. Journal of Computer Research and Development, 2019, 56(10): 2160-2169. DOI: 10.7544/issn1000-1239.2019.20190323
    [3]Wu Liqiang, Yang Xiaoyuan, Zhang Minqing. Identity-Based Threshold Decryption Scheme from Lattices under the Standard Model[J]. Journal of Computer Research and Development, 2018, 55(10): 2164-2173. DOI: 10.7544/issn1000-1239.2018.20180446
    [4]Li Xuejun, Yuan Yawen, Jin Chunhua. An Attribute-Based Broadcast Encryption Scheme Suitable for the Broadcasting Network[J]. Journal of Computer Research and Development, 2018, 55(7): 1409-1420. DOI: 10.7544/issn1000-1239.2018.20180085
    [5]Wang Guangbo, Liu Haitao, Wang Chenlu, Wang Pengcheng, Lian Lin, Hui Wentao. Revocable Attribute Based Encryption in Cloud Storage[J]. Journal of Computer Research and Development, 2018, 55(6): 1190-1200. DOI: 10.7544/issn1000-1239.2018.20170063
    [6]Xu Qian, Tan Chengxiang, Fan Zhijie, Feng Jun, Zhu Wenye, Xiao Ya. An Efficient Searchable Encryption Scheme with Designed Tester and Revocable Proxy Re-Encryption[J]. Journal of Computer Research and Development, 2018, 55(5): 994-1013. DOI: 10.7544/issn1000-1239.2018.20161051
    [7]Yan Xixi, Liu Yuan, Li Zichen, Tang Yongli. Multi-Authority Attribute-Based Encryption Scheme with Privacy Protection[J]. Journal of Computer Research and Development, 2018, 55(4): 846-853. DOI: 10.7544/issn1000-1239.2018.20161043
    [8]Zhang Kai, Wei Lifei, Li Xiangxue, Chen Jie, Qian Haifeng. An Efficient and Expressive Attribute-Based Encryption Scheme with Chosen Ciphertext Security[J]. Journal of Computer Research and Development, 2016, 53(10): 2239-2247. DOI: 10.7544/issn1000-1239.2016.20160430
    [9]Zhang Weiwei, Feng Gui, Liu Jianyi, Yang Yixian. A DRM Scheme Supporting Attribute Revocation and Outsourced Decryption in the Cloud Computing Environment[J]. Journal of Computer Research and Development, 2015, 52(12): 2659-2668. DOI: 10.7544/issn1000-1239.2015.20150749
    [10]Li Jiguo, Shi Yuerong, Zhang Yichen. A Privacy Preserving Attribute-Based Encryption Scheme with User Revocation[J]. Journal of Computer Research and Development, 2015, 52(10): 2281-2292. DOI: 10.7544/issn1000-1239.2015.20150580

Catalog

    Article views (1476) PDF downloads (704) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return