Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2018, Vol. 41 ›› Issue (3): 113-118.doi: 10.13190/j.jbupt.2017-220

• Reports • Previous Articles    

Attribute-Based Encryption Scheme With High Efficient Revocation in Cloud Computing Environment

CHEN Hong-song1,2, SHEN Qiang-lei1   

  1. 1. School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China;
    2. Beijing Key Laboratory of Knowledge Engineering for Materials Science, Beijing, 100083, China
  • Received:2017-11-06 Online:2018-06-28 Published:2018-06-04

Abstract: In order to solve the problem of user authorization revocation caused by user attributes change in open cloud computing environment, an attribute-based proxy re-encryption scheme based on proxy re-encryption and key segmentation is proposed. Instant revocation of user authorization is supported in the scheme. When user revocation occurs, it is only necessary to update the ciphertext component in the cloud storage server and unrevoked users' attribute independence private key component in the proxy server. When the user attribute revocation occurs, it is necessary to update the user attribute revocation list from which the user authorization can be limited. Then the workload of updating ciphertext and the user private key is lessen to improve the execution efficiency of re-encryption and access control scheme, at the same time,the privacy information of user attributes are protected.

Key words: attribute-based encryption, user-attribute revocation, access control, proxy re-encryption

CLC Number: