TY - GEN
T1 - Revocable Attribute-Based Encryption Scheme with Cryptographic Reverse Firewalls
AU - Zhao, Yang
AU - Ke, Xing Yu
AU - Pang, Yu Wei
AU - Xiong, Hu
AU - Zhu, Guo Bin
AU - Yeh, Kuo Hui
N1 - Publisher Copyright:
© 2024, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.
PY - 2024
Y1 - 2024
N2 - With the prevalence of information sharing, preserving the confidentiality of sensitive data has become paramount. Attribute-based encryption (ABE) has become a viable option to tackle this problem. Using a set of attributes, data owners can encrypt data with ABE, and data is only accessible by users with the required attributes and authorization. However, there are various limitations associated with the traditional CP-ABE scheme, such as embedding user-sensitive information in the access structures without any hidden operations, an inability to effectively address the issue of user attribute changes, and vulnerability to internal attacks from cryptography devices. To address these limitations, researchers have proposed various enhanced ABE schemes. Mironov presented a concept of cryptographic reverse firewall (CRF) in Eurocrypt 2015, which could resist certain compromised machines from leaking secret information. The CRF has been deployed in many cryptographic systems, but its application in the ABE field has been relatively limited. This paper presents a novel attribute-based encryption scheme which incorporates attribute revocation, hidden policy components, and CRF mechanism to prevent attackers from internal attacks on cryptography devices. This scheme is applicable in various applications, such as cloud computing, where secure data sharing is required.
AB - With the prevalence of information sharing, preserving the confidentiality of sensitive data has become paramount. Attribute-based encryption (ABE) has become a viable option to tackle this problem. Using a set of attributes, data owners can encrypt data with ABE, and data is only accessible by users with the required attributes and authorization. However, there are various limitations associated with the traditional CP-ABE scheme, such as embedding user-sensitive information in the access structures without any hidden operations, an inability to effectively address the issue of user attribute changes, and vulnerability to internal attacks from cryptography devices. To address these limitations, researchers have proposed various enhanced ABE schemes. Mironov presented a concept of cryptographic reverse firewall (CRF) in Eurocrypt 2015, which could resist certain compromised machines from leaking secret information. The CRF has been deployed in many cryptographic systems, but its application in the ABE field has been relatively limited. This paper presents a novel attribute-based encryption scheme which incorporates attribute revocation, hidden policy components, and CRF mechanism to prevent attackers from internal attacks on cryptography devices. This scheme is applicable in various applications, such as cloud computing, where secure data sharing is required.
KW - Attribute-based Encryption
KW - Attributes revocation
KW - Cryptographic Reverse Firewalls
KW - Data sharing
KW - Partial Hidden policy
UR - http://www.scopus.com/inward/record.url?scp=85185728510&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-52265-9_6
DO - 10.1007/978-3-031-52265-9_6
M3 - Conference contribution
AN - SCOPUS:85185728510
SN - 9783031522642
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
SP - 79
EP - 94
BT - Big Data Technologies and Applications - 13th EAI International Conference, BDTA 2023, Proceedings
A2 - Tan, Zhiyuan
A2 - Wu, Yulei
A2 - Xu, Min
PB - Springer Science and Business Media Deutschland GmbH
T2 - 13th International Conference on Big Data Technologies and Applications, BDTA 2023
Y2 - 23 August 2023 through 24 August 2023
ER -