File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Server‐aided revocable attribute‐based encryption for cloud computing services

TitleServer‐aided revocable attribute‐based encryption for cloud computing services
Authors
Keywordsaccess control
attribute‐based encryption
cloud computing
outsourced computation
revocation
Issue Date2020
PublisherJohn Wiley & Sons Ltd. The Journal's web site is located at http://www.interscience.wiley.com/jpages/1532-0626/
Citation
Concurrency and Computation: Practice & Experience, 2020, v. 32 n. 14, p. article no. e5680 How to Cite?
AbstractAttribute‐based encryption (ABE) has been regarded as a promising solution in cloud computing services to enable scalable access control without compromising the security. Despite of the advantages, efficient user revocation has been a challenge in ABE. One suggestion for user revocation is using the binary tree in the key generation phase of an ABE scheme, which enables a trusted key generation center to periodically distribute the key update information to all nonrevoked users over a public channel. This revocation approach reduces the size of key updates from linear to logarithmic in the number of users. But it requires each user to keep a private key of the logarithmic size, and asks each nonrevoked user to periodically update his/her decryption key for each new time period. To further optimize user revocation in ABE, a server‐aided revocable ABE (SR‐ABE) scheme has been proposed, in which almost all workloads of users incurred by the user revocation are outsourced to an untrusted server, and each user only needs to store a private key of the constant size. In addition, SR‐ABE does not require any secure channel for the key transmission, and a user only needs to perform a small amount of calculations to decrypt a ciphertext. In this paper, we revisit the notion of SR‐ABE, and present a generic construction of SR‐ABE, which can transform a revocable ABE (RABE) scheme to an SR‐ABE scheme. In addition, we give an instantiation of SR‐ABE by applying the generic construction on a concrete RABE scheme, and implement an instantiation of SR‐ABE and an RABE scheme to evaluate the performance of SR‐ABE.
Persistent Identifierhttp://hdl.handle.net/10722/284904
ISSN
2021 Impact Factor: 1.831
2020 SCImago Journal Rankings: 0.309
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorCui, H-
dc.contributor.authorYuen, TH-
dc.contributor.authorDeng, RH-
dc.contributor.authorWang, G-
dc.date.accessioned2020-08-07T09:04:09Z-
dc.date.available2020-08-07T09:04:09Z-
dc.date.issued2020-
dc.identifier.citationConcurrency and Computation: Practice & Experience, 2020, v. 32 n. 14, p. article no. e5680-
dc.identifier.issn1532-0626-
dc.identifier.urihttp://hdl.handle.net/10722/284904-
dc.description.abstractAttribute‐based encryption (ABE) has been regarded as a promising solution in cloud computing services to enable scalable access control without compromising the security. Despite of the advantages, efficient user revocation has been a challenge in ABE. One suggestion for user revocation is using the binary tree in the key generation phase of an ABE scheme, which enables a trusted key generation center to periodically distribute the key update information to all nonrevoked users over a public channel. This revocation approach reduces the size of key updates from linear to logarithmic in the number of users. But it requires each user to keep a private key of the logarithmic size, and asks each nonrevoked user to periodically update his/her decryption key for each new time period. To further optimize user revocation in ABE, a server‐aided revocable ABE (SR‐ABE) scheme has been proposed, in which almost all workloads of users incurred by the user revocation are outsourced to an untrusted server, and each user only needs to store a private key of the constant size. In addition, SR‐ABE does not require any secure channel for the key transmission, and a user only needs to perform a small amount of calculations to decrypt a ciphertext. In this paper, we revisit the notion of SR‐ABE, and present a generic construction of SR‐ABE, which can transform a revocable ABE (RABE) scheme to an SR‐ABE scheme. In addition, we give an instantiation of SR‐ABE by applying the generic construction on a concrete RABE scheme, and implement an instantiation of SR‐ABE and an RABE scheme to evaluate the performance of SR‐ABE.-
dc.languageeng-
dc.publisherJohn Wiley & Sons Ltd. The Journal's web site is located at http://www.interscience.wiley.com/jpages/1532-0626/-
dc.relation.ispartofConcurrency and Computation: Practice & Experience-
dc.rightsPreprint This is the pre-peer reviewed version of the following article: [FULL CITE], which has been published in final form at [Link to final article using the DOI]. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Use of Self-Archived Versions. Postprint This is the peer reviewed version of the following article: [FULL CITE], which has been published in final form at [Link to final article using the DOI]. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Use of Self-Archived Versions.-
dc.subjectaccess control-
dc.subjectattribute‐based encryption-
dc.subjectcloud computing-
dc.subjectoutsourced computation-
dc.subjectrevocation-
dc.titleServer‐aided revocable attribute‐based encryption for cloud computing services-
dc.typeArticle-
dc.identifier.emailYuen, TH: johnyuen@hku.hk-
dc.identifier.authorityYuen, TH=rp02426-
dc.description.naturelink_to_subscribed_fulltext-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1002/cpe.5680-
dc.identifier.scopuseid_2-s2.0-85078679731-
dc.identifier.hkuros312546-
dc.identifier.volume32-
dc.identifier.issue14-
dc.identifier.spagearticle no. e5680-
dc.identifier.epagearticle no. e5680-
dc.identifier.isiWOS:000509861400001-
dc.publisher.placeUnited Kingdom-
dc.identifier.issnl1532-0626-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats