Inicio  /  Information  /  Vol: 15 Par: 1 (2024)  /  Artículo
ARTÍCULO
TITULO

Efficient Revocable Attribute-Based Encryption with Data Integrity and Key Escrow-Free

Meijuan Huang    
Yutian Liu    
Bo Yang    
Yanqi Zhao and Mingrui Zhang    

Resumen

Revocable attribute-based encryption (RABE) provides greater flexibility and fine-grained access control for data sharing. However, the revocation process for most RABE schemes today is performed by the cloud storage provider (CSP). Since the CSP is an honest and curious third party, there is no guarantee that the plaintext data corresponding to the new ciphertext after revocation is the same as the original plaintext data. In addition, most attribute-based encryption schemes suffer from issues related to key escrow. To overcome the aforementioned issues, we present an efficient RABE scheme that supports data integrity while also addressing the key escrow issue. We demonstrate the security for our system, which is reduced to the decisional q-parallel bilinear Diffie-Hellman exponent (q-PBDHE) assumption and discrete logarithm (DL) assumption. The performance analysis illustrates that our scheme is efficient.

 Artículos similares

       
 
Samia Masood Awan, Muhammad Ajmal Azad, Junaid Arshad, Urooj Waheed and Tahir Sharif    
The connected or smart environment is the integration of smart devices (sensors, IoT devices, or actuator) into the Internet of Things (IoT) paradigm, in which a large number of devices are connected, monitoring the physical environment and processes and... ver más
Revista: Information

 
Vangelis Malamas, George Palaiologos, Panayiotis Kotzanikolaou, Mike Burmester and Dimitris Glynos    
Although there are several access control systems in the literature for flexible policy management in multi-authority and multi-domain environments, achieving interoperability and scalability, without relying on strong trust assumptions, is still an open... ver más
Revista: Applied Sciences

 
Dong-Her Shih, Ting-Wei Wu, Ming-Hung Shih, Guan-Wei Chen and David C. Yen    
The Industrial Internet of Things (IIoT) plays an important role in Industry 4.0, but the existing IIoT systems could be vulnerable to a single point of failure and malicious attacks, failing to provide reliable services. IIoT devices have some particula... ver más
Revista: Applied Sciences

 
Hedia Zardi, Hanen Karamti, Walid Karamti and Norah Saleh Alghamdi    
Anomaly detection in online social networks (OSNs) is an important data mining task that aims to detect unexpected and suspicious users. To enhance anomaly exploration, anomaly ranking is used to assess the degree of user anomaly rather than applying bin... ver más
Revista: Applied Sciences

 
Peng Zhai, Jingsha He and Nafei Zhu    
The integration of information systems and physical systems is the development trend of today?s manufacturing industry. Intelligent manufacturing is a new model of manufacturing, based on advanced manufacturing technology with human?machine?material coll... ver más
Revista: Applied Sciences