Dynamic Policy Update for Ciphertext-Policy Attribute-Based Encryption

نویسنده

  • Wei Yuan
چکیده

Ciphertext-policy attribute-based encryption (CP-ABE) is regarded as a promising cryptographic tool for encrypted access control in public cloud storage systems. However, a problem for CP-ABE schemes is that there is no way to change access policy on ciphertext once it is generated. This shortcoming makes us cannot conveniently use CP-ABE as traditional 1-to-1 public key encryption when the access policy needs to be changed. In this paper, we propose a dynamic policy update algorithm for CP-ABE. The policy update algorithm not only has the ability to remove attributes from an access policy but also is able to add newly issued attributes to an access policy. When the access policy of a ciphertext changes, user private key will always be fixed and thus private channels to update user keys are eliminated. Moreover, our policy update algorithm does not rely on predefined attributes, such as timestamp and user ID, and does not produce new public parameters as well. The update algorithm can be independently executed by the creator of a ciphertext and the update times for the ciphertext are unlimited. We construct such a scheme and show its usage in a practical scenario. The performance analysis shows an excellent result: The communication, computation, and storage costs of our policy update are only relevant to the number of attributes in access policy.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Ciphertext-Policy Attribute-based Keyword Search with Revocation in Cloud through LSSS Approach

In the cloud computing, attribute-based encryption and public key encryption with keyword search are two popular issues. Ciphertext-policy attribute-based encryption is famous for its fine-grained access control. Keyword Search over encrypted files is an important function in the actual situation. We particularly concern the problem of revocation. Additionally, several solutions of the dynamic ...

متن کامل

Multiparty Access Control of Ciphertext Sharing in Cloud-Based Online Social Networks

Although current online social networks (OSNs) schemes propose to encrypt data before sharing, the enforcement of access policies over encrypted data has become a challenging task, and the OSNs currently do not provide any mechanism to allow users to update access policies. In this paper, we propose a ciphertext sharing scheme in cloudbased OSNs, which allows the users to outsource encrypted da...

متن کامل

Updating attribute in CP-ABE: A New Approach

In Ciphertext-Policy Attribute Based Encryption (CP-ABE), attributes are attached to the user's secret key and access policy is attached to the ciphertext. If attributes in the secret key of a user satisfy the policy then only the user can decrypt the ciphertext. However, such scenario also necessitates periodic updating of the secret key with the changing attributes. According to our obse...

متن کامل

Chosen Ciphertext Secure Ciphertext-Policy Attribute-Based Encryption with Constant Ciphertext Length and Threshold Policy

A ciphertext-policy attribute-based encryption scheme allows that an encrypter assigns a decryption policy to ciphertexts. Any user will be able to decrypt if and only if a set of attributes (his private key) satisfy the assigned decryption policy. In this paper we first propose a new chosen ciphertext secure ciphertext-policy attribute-based encryption scheme with constant-size ciphertext and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2016  شماره 

صفحات  -

تاریخ انتشار 2016