Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2017 (2017), Article ID 6808190, 10 pages
https://doi.org/10.1155/2017/6808190
Research Article

Modified Ciphertext-Policy Attribute-Based Encryption Scheme with Efficient Revocation for PHR System

1School of Software Engineering, Shenzhen Institute of Information Technology, Shenzhen, China
2School of Computer and Software Engineering, Shenzhen University, Shenzhen, China

Correspondence should be addressed to Jianyong Chen

Received 26 January 2017; Accepted 3 August 2017; Published 30 August 2017

Academic Editor: Haipeng Peng

Copyright © 2017 Hongying Zheng et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Li, “Ensuring privacy in a personal health record system,” Computer, vol. 48, no. 2, Article ID 7042698, pp. 24–31, 2015. View at Publisher · View at Google Scholar · View at Scopus
  2. Y. Yang and M. Ma, “Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 4, pp. 746–759, 2016. View at Publisher · View at Google Scholar · View at Scopus
  3. A. Ge, J. Zhang, R. Zhang, C. Ma, and Z. Zhang, “Security analysis of a privacy-preserving decentralized key-policy attribute-based encryption scheme,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 11, pp. 2319–2321, 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. M. Li, “Fractal time series---a tutorial review,” Mathematical Problems in Engineering, Article ID 157264, Art. ID 157264, 26 pages, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  5. M. Li, “Record length requirement of long-range dependent teletraffic,” Physica A. Statistical Mechanics and its Applications, vol. 472, pp. 164–187, 2017. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  6. S. Wang, J. Zhou, J. K. Liu, J. Yu, J. Chen, and W. Xie, “An efficient file hierarchy attribute-based encryption scheme in cloud computing,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 6, pp. 1265–1277, 2016. View at Publisher · View at Google Scholar · View at Scopus
  7. S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in Proceedings of the 5th ACM Symposium on Information, Computer and Communication Security, (ASIACCS '10), pp. 261–270, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  8. A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in cryptology, vol. 3494 of Lecture Notes in Comput. Sci., pp. 457–473, Springer, Berlin, 2005. View at Publisher · View at Google Scholar · View at MathSciNet
  9. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06), pp. 89–98, November 2006. View at Publisher · View at Google Scholar · View at Scopus
  10. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proceedings of the IEEE Symposium on Security and Privacy (SP '07), pp. 321–334, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  11. M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 131–143, 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proceedings of the IEEE INFOCOM, pp. 1–9, March 2010. View at Publisher · View at Google Scholar · View at Scopus
  13. M. Chase and S. S. M. Chow, “Improving privacy and security in multi-authority attribute-based encryption,” in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09), pp. 121–130, Chicago, Ill, USA, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  14. A. Lewko and B. Waters, “Decentralizing attribute-based encryption,” in Advances in cryptology, vol. 6632 of Lecture Notes in Comput. Sci., pp. 568–588, Springer, Heidelberg, 2011. View at Publisher · View at Google Scholar · View at MathSciNet
  15. H. Lin, Z. Cao, X. Liang, and J. Shao, “Secure threshold multi authority attribute based encryption without a central authority,” Information Sciences. An International Journal, vol. 180, no. 13, pp. 2618–2632, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  16. S. Muller, S. Katzenbeisser, and C. Eckert, “Distributed attribute-based encryption,” in Information security and cryptology, vol. 5461 of Lecture Notes in Comput. Sci., pp. 20–36, Springer, Berlin, 2009. View at Publisher · View at Google Scholar · View at MathSciNet
  17. M. Chase, “Multi-authority attribute based encryption,” in Theory of Cryptography, vol. 4392 of Lecture Notes in Computer Science, pp. 515–534, Springer, Berlin, Germany, 2007. View at Publisher · View at Google Scholar · View at MathSciNet
  18. K. Yang and X. Jia, “Expressive, efficient, and revocable data access control for multi-authority cloud storage,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 7, pp. 1735–1744, 2014. View at Publisher · View at Google Scholar · View at Scopus
  19. S. Ruj, A. Nayak, and I. Stojmenovic, “DACC: distributed access control in clouds,” in Proceedings of the IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom '11), pp. 91–98, Changsha, China, November 2011. View at Publisher · View at Google Scholar · View at Scopus
  20. L. Li, T. L. Gu, L. Chang, Z. B. Xu, Y. N. Liu, and J. Y. Qian, “A ciphertext-policy attribute-based encryption based on an ordered binary decision diagram,” IEEE Access, vol. 5, pp. 1137–1145, 2017. View at Google Scholar
  21. L. Ibraimi, M. Asim, and M. Petković, “Secure management of personal health records by applying attribute-based encryption,” in Proceedings of the 6th International Workshop on Wearable, Micro, and Nano Technologies for Personalized Health, pp. 71–74, Oslo, Norway, June 2009. View at Publisher · View at Google Scholar · View at Scopus
  22. W. Li, K. Xue, Y. Xue, and J. Hong, “TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 5, pp. 1484–1496, 2016. View at Publisher · View at Google Scholar · View at Scopus
  23. X. Wu, R. Jiang, and B. Bhargava, “On the security of data access control for multiauthority cloud storage systems,” IEEE Transactions on Services Computing, vol. PP, no. 99, 2015. View at Publisher · View at Google Scholar · View at Scopus
  24. D. Boneh, E.-J. Goh, and K. Nissim, “Evaluating 2-{DNF} formulas on ciphertexts,” in Theory of cryptography, vol. 3378 of Lecture Notes in Comput. Sci., pp. 325–341, Springer, Berlin, 2005. View at Publisher · View at Google Scholar · View at MathSciNet
  25. S. Wang, K. Liang, J. K. Liu, J. Chen, J. Yu, and W. Xie, “Attribute-Based Data Sharing Scheme Revisited in Cloud Computing,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 8, pp. 1661–1673, 2016. View at Publisher · View at Google Scholar · View at Scopus