File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1002/cpe.5680
- Scopus: eid_2-s2.0-85078679731
- WOS: WOS:000509861400001
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Server‐aided revocable attribute‐based encryption for cloud computing services
Title | Server‐aided revocable attribute‐based encryption for cloud computing services |
---|---|
Authors | |
Keywords | access control attribute‐based encryption cloud computing outsourced computation revocation |
Issue Date | 2020 |
Publisher | John Wiley & Sons Ltd. The Journal's web site is located at http://www.interscience.wiley.com/jpages/1532-0626/ |
Citation | Concurrency and Computation: Practice & Experience, 2020, v. 32 n. 14, p. article no. e5680 How to Cite? |
Abstract | Attribute‐based encryption (ABE) has been regarded as a promising solution in cloud computing services to enable scalable access control without compromising the security. Despite of the advantages, efficient user revocation has been a challenge in ABE. One suggestion for user revocation is using the binary tree in the key generation phase of an ABE scheme, which enables a trusted key generation center to periodically distribute the key update information to all nonrevoked users over a public channel. This revocation approach reduces the size of key updates from linear to logarithmic in the number of users. But it requires each user to keep a private key of the logarithmic size, and asks each nonrevoked user to periodically update his/her decryption key for each new time period. To further optimize user revocation in ABE, a server‐aided revocable ABE (SR‐ABE) scheme has been proposed, in which almost all workloads of users incurred by the user revocation are outsourced to an untrusted server, and each user only needs to store a private key of the constant size. In addition, SR‐ABE does not require any secure channel for the key transmission, and a user only needs to perform a small amount of calculations to decrypt a ciphertext. In this paper, we revisit the notion of SR‐ABE, and present a generic construction of SR‐ABE, which can transform a revocable ABE (RABE) scheme to an SR‐ABE scheme. In addition, we give an instantiation of SR‐ABE by applying the generic construction on a concrete RABE scheme, and implement an instantiation of SR‐ABE and an RABE scheme to evaluate the performance of SR‐ABE. |
Persistent Identifier | http://hdl.handle.net/10722/284904 |
ISSN | 2021 Impact Factor: 1.831 2020 SCImago Journal Rankings: 0.309 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cui, H | - |
dc.contributor.author | Yuen, TH | - |
dc.contributor.author | Deng, RH | - |
dc.contributor.author | Wang, G | - |
dc.date.accessioned | 2020-08-07T09:04:09Z | - |
dc.date.available | 2020-08-07T09:04:09Z | - |
dc.date.issued | 2020 | - |
dc.identifier.citation | Concurrency and Computation: Practice & Experience, 2020, v. 32 n. 14, p. article no. e5680 | - |
dc.identifier.issn | 1532-0626 | - |
dc.identifier.uri | http://hdl.handle.net/10722/284904 | - |
dc.description.abstract | Attribute‐based encryption (ABE) has been regarded as a promising solution in cloud computing services to enable scalable access control without compromising the security. Despite of the advantages, efficient user revocation has been a challenge in ABE. One suggestion for user revocation is using the binary tree in the key generation phase of an ABE scheme, which enables a trusted key generation center to periodically distribute the key update information to all nonrevoked users over a public channel. This revocation approach reduces the size of key updates from linear to logarithmic in the number of users. But it requires each user to keep a private key of the logarithmic size, and asks each nonrevoked user to periodically update his/her decryption key for each new time period. To further optimize user revocation in ABE, a server‐aided revocable ABE (SR‐ABE) scheme has been proposed, in which almost all workloads of users incurred by the user revocation are outsourced to an untrusted server, and each user only needs to store a private key of the constant size. In addition, SR‐ABE does not require any secure channel for the key transmission, and a user only needs to perform a small amount of calculations to decrypt a ciphertext. In this paper, we revisit the notion of SR‐ABE, and present a generic construction of SR‐ABE, which can transform a revocable ABE (RABE) scheme to an SR‐ABE scheme. In addition, we give an instantiation of SR‐ABE by applying the generic construction on a concrete RABE scheme, and implement an instantiation of SR‐ABE and an RABE scheme to evaluate the performance of SR‐ABE. | - |
dc.language | eng | - |
dc.publisher | John Wiley & Sons Ltd. The Journal's web site is located at http://www.interscience.wiley.com/jpages/1532-0626/ | - |
dc.relation.ispartof | Concurrency and Computation: Practice & Experience | - |
dc.rights | Preprint This is the pre-peer reviewed version of the following article: [FULL CITE], which has been published in final form at [Link to final article using the DOI]. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Use of Self-Archived Versions. Postprint This is the peer reviewed version of the following article: [FULL CITE], which has been published in final form at [Link to final article using the DOI]. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Use of Self-Archived Versions. | - |
dc.subject | access control | - |
dc.subject | attribute‐based encryption | - |
dc.subject | cloud computing | - |
dc.subject | outsourced computation | - |
dc.subject | revocation | - |
dc.title | Server‐aided revocable attribute‐based encryption for cloud computing services | - |
dc.type | Article | - |
dc.identifier.email | Yuen, TH: johnyuen@hku.hk | - |
dc.identifier.authority | Yuen, TH=rp02426 | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1002/cpe.5680 | - |
dc.identifier.scopus | eid_2-s2.0-85078679731 | - |
dc.identifier.hkuros | 312546 | - |
dc.identifier.volume | 32 | - |
dc.identifier.issue | 14 | - |
dc.identifier.spage | article no. e5680 | - |
dc.identifier.epage | article no. e5680 | - |
dc.identifier.isi | WOS:000509861400001 | - |
dc.publisher.place | United Kingdom | - |
dc.identifier.issnl | 1532-0626 | - |