Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2017, Article ID 4070616, 12 pages
https://doi.org/10.1155/2017/4070616
Research Article

Research on Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage

Zhengzhou Information Science and Technology Institute, Zhengzhou, Henan 450004, China

Correspondence should be addressed to Guangbo Wang; moc.qq@175957196

Received 17 February 2017; Revised 1 April 2017; Accepted 5 April 2017; Published 23 May 2017

Academic Editor: Liu Yuhong

Copyright © 2017 Guangbo Wang and Jianhua Wang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Sahai and B. Waters, “Fuzzy identity-based Encryption,” in Advances in cryptology---{EUROCRYPT} 2005, vol. 3494 of Lecture Notes in Computer Sci., pp. 457–473, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar · View at MathSciNet
  2. U. C. Yadav, “Ciphertext-policy attribute-based encryption with hiding access structure,” in Proceedings of the 2015 5th IEEE International Advance Computing Conference, (IACC '15), pp. 6–10, India, June 2015. View at Publisher · View at Google Scholar · View at Scopus
  3. T. Naruse, M. Mohri, and Y. Shiraishi, “Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating,” Human-centric Computing and Information Sciences, vol. 5, no. 1, pp. 1–13, 2015. View at Publisher · View at Google Scholar · View at Scopus
  4. H. Wang, B. Yang, and Y. Wang, “Server aided ciphertext-policy attribute-based encryption,” in proceedings of the IEEE International Conference on Advanced Information Networking Applications Workshops, pp. 440–444, Gwangju, Korea, 2015.
  5. Q. Li, J. Ma, R. Li, J. Xiong, and X. Liu, “Large universe decentralized key-policy attribute-based encryption,” Security and Communication Networks, vol. 8, no. 3, pp. 501–509, 2015. View at Publisher · View at Google Scholar · View at Scopus
  6. X. Wang, J. Zhang, E. M. Schooler, and M. Ion, “Performance evaluation of Attribute-Based Encryption: toward data privacy in the IoT,” in proceedings of the 2014 1st IEEE International Conference on Communications (ICC '14), pp. 725–730, Sydney, Australia, June 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. R. Ostrovsky, A. Sahai, and B. Waters, “Attribute-based encryption with non-monotonic access structures,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 195–203, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  8. J. Staddon, P. Golle, M. Gagne, and P. Rasmussen, “A content-driven access control system,” in Proceedings of the 7th Symposium on Identity and Trust on the Internet (IDtrust '08), pp. 26–35, Gaithersburg, Maryland, USA, March 2008. View at Publisher · View at Google Scholar · View at Scopus
  9. X. Liang, R. Lu, and X. Lin, “Ciphertext policy attribute based encryption with efficient revocation,” in Proceedings of the IEEE Symposium on Security Privacy, vol. 2008, pp. 321–334, 2010.
  10. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proceedings of the IEEE Symposium on Security and Privacy (SP '07), pp. 321–334, Oakland, California, USA, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  11. A. Boldyreva, V. Goyal, and V. Kumart, “Identity-based encryption with efficient revocation,” in Proceedings of the 15th ACM conference on Computer and Communications Security (CCS '08), pp. 417–426, Alexandria, VA, USA, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  12. M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, “Secure attribute-based systems,” in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06), pp. 99–112, Alexandria, Va, USA, October-November 2006. View at Publisher · View at Google Scholar · View at Scopus
  13. J. Hur and D. K. Noh, “Attribute-based access control with efficient revocation in data outsourcing systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 7, pp. 1214–1221, 2011. View at Publisher · View at Google Scholar · View at Scopus
  14. K. Yang, X. Jia, and K. Ren, “Attribute-based fine-grained access control with efficient revocation in cloud storage systems,” in Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS '13), pp. 523–528, May 2013. View at Publisher · View at Google Scholar · View at Scopus
  15. E. Zavattoni, L. J. Perez, S. Mitsunari et al., “Software implementation of an attribute-based encryption scheme,” IEEE Transactions on Computers, vol. 64, no. 5, pp. 1429–1441, 2015. View at Publisher · View at Google Scholar · View at MathSciNet
  16. B. Waters, “Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization,” Lecture Notes in Computer Science, vol. 2008, pp. 321–334, 2011. View at Publisher · View at Google Scholar · View at MathSciNet
  17. L. Cheung and C. Newport, “Provably secure ciphertext policy ABE,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 456–465, NY, USA, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  18. S. S. Tu, S. Z. Niu, and H. Li, “A fine-grained access control and revocation scheme on clouds,” Concurrency & Computation Practice & Experience, vol. 28, no. 6, 2012. View at Google Scholar
  19. A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, “Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption,” in Advances in cryptology---{EUROCRYPT} 2010, vol. 6110 of Lecture Notes in Comput. Sci., pp. 62–91, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar · View at MathSciNet
  20. B. Lynn, “The pairing-based cryptography (PBC) library[OL],” 2006, http://crypto.stanford.edu/pbc.
  21. J. Bethencourt, A. Sahai, and B. Waters, “Advanced crypto software collection: the cpabetoolkit[OL],” 2001, http://acsc.cs.utexas.edu/cpabe.