Computer Engineering & Science ›› 2013, Vol. 35 ›› Issue (9): 94-98.
Previous Articles Next Articles
CHI shuiming1,CHEN qin2,DANG zhengqin2
Received:
Revised:
Online:
Published:
Abstract:
Based on the analysis of existing attributebased encryption schemes with attribute revocation, a new attributebased encryption scheme with attribute revocation and key delegation based on policy control is proposed. The arbitrator of scheme can control attribute revocation and key delegation flexibly via two policy table, i.e. table of attribute revocation and table of attribute proxy. By querying the attribute revocation table, the arbitrator refuse to decrypt for the user of which attribute has revoked to achieve the purpose of attribute revocation. When the decryption right is delegated, the key of delegation conversion is sent to the arbitrator. By using of attribute proxy table, the arbitrator decides if the user has the right of delegation, so as to achieve the goal of flexible attribute proxy. The scheme uses a linear secret sharing matrix to construct the access policies in order to support flexible access structure and applies the key division technology to the key distribution. Finally, the correctness and security of proposed scheme are proven.
Key words: attributebased encryption, attribute revocation, proxy encryption, linear secret sharing scheme
CHI shuiming, CHEN qin, DANG zhengqin. An attributebased encryption scheme with attribute#br# revocation and key delegation based on policy control [J]. Computer Engineering & Science, 2013, 35(9): 94-98.
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://joces.nudt.edu.cn/EN/
http://joces.nudt.edu.cn/EN/Y2013/V35/I9/94