Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.

In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user may have multiple attributes, and each attribute may be shared simultaneously by many users. The decryption key of an attribute can thus be shared by many users who all possess the attribute. For monetary gain, a malicious aut...

Full description

Bibliographic Details
Main Authors: Shangping Wang, Keke Guo, Yaling Zhang
Format: Article
Language:English
Published: Public Library of Science (PLoS) 2018-01-01
Series:PLoS ONE
Online Access:http://europepmc.org/articles/PMC6136790?pdf=render
id doaj-1c8a4aa9ba3b46fa9d1eb5abe5633081
record_format Article
spelling doaj-1c8a4aa9ba3b46fa9d1eb5abe56330812020-11-25T01:26:49ZengPublic Library of Science (PLoS)PLoS ONE1932-62032018-01-01139e020322510.1371/journal.pone.0203225Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.Shangping WangKeke GuoYaling ZhangIn a ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user may have multiple attributes, and each attribute may be shared simultaneously by many users. The decryption key of an attribute can thus be shared by many users who all possess the attribute. For monetary gain, a malicious authorized user may reveal his/her decryption key to a third party, and it is difficult to trace the owner of primitive secret key from an exposed key. At the same time, this situation may also limit commercial applications of CP-ABE systems. To solve these problems and enable fine-grained access control for the encrypted data, we propose a traceable CP-ABE scheme with attribute-level user revocation for cloud storage (TUR-CPABE). Our scheme enjoys four advantages. First, it has the ability to trace malicious users who have leaked key information from the system. Second, it supports attribute-level user revocation for malicious users and allows ABE fine-grained access control. Third, it allows secret key updates and ciphertext updates to resist collusion attacks between users. Fourth, outsourcing encryption, decryption and attribute revocation are used to reduce the computational burden on data owners, data users and the trust authority, respectively. In addition, our scheme has been proven to be secure against chosen plaintext attacks under a selective access policy based on decisional q - BDHE assumption in the standard model.http://europepmc.org/articles/PMC6136790?pdf=render
collection DOAJ
language English
format Article
sources DOAJ
author Shangping Wang
Keke Guo
Yaling Zhang
spellingShingle Shangping Wang
Keke Guo
Yaling Zhang
Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.
PLoS ONE
author_facet Shangping Wang
Keke Guo
Yaling Zhang
author_sort Shangping Wang
title Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.
title_short Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.
title_full Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.
title_fullStr Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.
title_full_unstemmed Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.
title_sort traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.
publisher Public Library of Science (PLoS)
series PLoS ONE
issn 1932-6203
publishDate 2018-01-01
description In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user may have multiple attributes, and each attribute may be shared simultaneously by many users. The decryption key of an attribute can thus be shared by many users who all possess the attribute. For monetary gain, a malicious authorized user may reveal his/her decryption key to a third party, and it is difficult to trace the owner of primitive secret key from an exposed key. At the same time, this situation may also limit commercial applications of CP-ABE systems. To solve these problems and enable fine-grained access control for the encrypted data, we propose a traceable CP-ABE scheme with attribute-level user revocation for cloud storage (TUR-CPABE). Our scheme enjoys four advantages. First, it has the ability to trace malicious users who have leaked key information from the system. Second, it supports attribute-level user revocation for malicious users and allows ABE fine-grained access control. Third, it allows secret key updates and ciphertext updates to resist collusion attacks between users. Fourth, outsourcing encryption, decryption and attribute revocation are used to reduce the computational burden on data owners, data users and the trust authority, respectively. In addition, our scheme has been proven to be secure against chosen plaintext attacks under a selective access policy based on decisional q - BDHE assumption in the standard model.
url http://europepmc.org/articles/PMC6136790?pdf=render
work_keys_str_mv AT shangpingwang traceableciphertextpolicyattributebasedencryptionschemewithattributeleveluserrevocationforcloudstorage
AT kekeguo traceableciphertextpolicyattributebasedencryptionschemewithattributeleveluserrevocationforcloudstorage
AT yalingzhang traceableciphertextpolicyattributebasedencryptionschemewithattributeleveluserrevocationforcloudstorage
_version_ 1725108770796732416