J4 ›› 2015, Vol. 42 ›› Issue (6): 6-10+55.doi: 10.3969/j.issn.1001-2400.2015.06.002

• Original Articles • Previous Articles     Next Articles

Attribute-based encryption scheme supporting attribute revocation and decryption outsourcing

MA Hua;BAI Cuicui;LI Bin;LIU Zhenhua   

  1. (School of Mathematics and Statistics, Xidian Univ., Xi'an  710071, China)
  • Received:2014-12-21 Online:2015-12-20 Published:2016-01-25
  • Contact: MA Hua E-mail:hma@mail.xidian.edu.cn

Abstract:

Aiming to tackle the attribute revocation issue and reduce the user's computational overheads, an attribute-based encryption scheme is proposed and it can support attribute revocation and decryption outsourcing. In the proposed scheme, the splitting and reconstruction of secrets is realized by the linear secret sharing technique, and key update is based on the KEK(Key Encrypting Key) tree. In decryption, our scheme outsources some decryption computational tasks to a decryption service provider, which reduces the computational cost on users' side. Security analysis indicates that the proposed scheme can resist collusion attack, and ensure data confidentiality and forward/backward secrecy. Experimental results show that the efficiency of ciphertext update and decryption is improved in terms of time cost.

Key words: attribute-based encryption, attribute, revocation, outsourcing

CLC Number: 

  • TN918