Fine-grained user access control in ciphertext-policy attribute-based encryption

Cited 7 time in webofscience Cited 0 time in scopus
  • Hit : 365
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorHur, Jko
dc.contributor.authorPark, Cko
dc.contributor.authorHwang, SOko
dc.date.accessioned2013-03-11T02:22:06Z-
dc.date.available2013-03-11T02:22:06Z-
dc.date.created2012-04-18-
dc.date.created2012-04-18-
dc.date.issued2012-
dc.identifier.citationSECURITY AND COMMUNICATION NETWORKS, v.5, no.3, pp.253 - 261-
dc.identifier.issn1939-0114-
dc.identifier.urihttp://hdl.handle.net/10203/98027-
dc.description.abstractKey revocation is one of the most challenging and open issues in attribute-based encryption (ABE). The previous revocable ABE schemes feature a mechanism that revokes the attribute key periodically without any consideration of the user membership associated with the attribute. Thus, non-revoked users are enforced to access the key authority periodically to receive keying materials in order to update the current key. This is due to the fact that the revocation is done only on the attribute level, which results in security and scalability problems. In this paper, we propose a fine-grained user revocation scheme without affecting any non-revoked users who share the same attributes in ciphertext-policy ABE; it does not require the users to access the key authority and to update keys periodically. The proposed scheme improves the efficiency compared with previous revocable schemes and enhances the security in terms of the backward/forward secrecy on any membership changes in the ciphertext-policy ABE system. Copyright (C) 2011 John Wiley & Sons, Ltd.-
dc.languageEnglish-
dc.publisherWILEY-BLACKWELL-
dc.titleFine-grained user access control in ciphertext-policy attribute-based encryption-
dc.typeArticle-
dc.identifier.wosid000300710800004-
dc.identifier.scopusid2-s2.0-84857466096-
dc.type.rimsART-
dc.citation.volume5-
dc.citation.issue3-
dc.citation.beginningpage253-
dc.citation.endingpage261-
dc.citation.publicationnameSECURITY AND COMMUNICATION NETWORKS-
dc.identifier.doi10.1002/sec.345-
dc.contributor.nonIdAuthorHur, J-
dc.contributor.nonIdAuthorHwang, SO-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorciphertext-policy-
dc.subject.keywordAuthorattribute-based encryption-
dc.subject.keywordAuthorrevocation-
dc.subject.keywordAuthoraccess control-
dc.subject.keywordAuthorcryptography-
Appears in Collection
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 7 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0