Multi-authority attribute-based encryption with efficient user revocation in cloud computing

An efficient user revocable multi-authority ABE scheme was proposed,a “hybrid decryption key” for each user isused to achieve efficient user revocation.Comparing with the existing schemes,this scheme is more effective in user revocation.In addition,the scheme can also achieve user dynamic privileges...

Full description

Saved in:
Bibliographic Details
Main Authors: Liang-xuan ZHANG, Hui LI
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2016-02-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00023
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530405027577856
author Liang-xuan ZHANG
Hui LI
author_facet Liang-xuan ZHANG
Hui LI
author_sort Liang-xuan ZHANG
collection DOAJ
description An efficient user revocable multi-authority ABE scheme was proposed,a “hybrid decryption key” for each user isused to achieve efficient user revocation.Comparing with the existing schemes,this scheme is more effective in user revocation.In addition,the scheme can also achieve user dynamic privileges management,partial data outsource encryption and ciphertext partially decrypted in the cloud server and shared data self-destruction after expiration.
format Article
id doaj-art-cd1b5852d38942fca7b816d91c2fa7ac
institution Kabale University
issn 2096-109X
language English
publishDate 2016-02-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-cd1b5852d38942fca7b816d91c2fa7ac2025-01-15T03:04:23ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-02-012627459543957Multi-authority attribute-based encryption with efficient user revocation in cloud computingLiang-xuan ZHANGHui LIAn efficient user revocable multi-authority ABE scheme was proposed,a “hybrid decryption key” for each user isused to achieve efficient user revocation.Comparing with the existing schemes,this scheme is more effective in user revocation.In addition,the scheme can also achieve user dynamic privileges management,partial data outsource encryption and ciphertext partially decrypted in the cloud server and shared data self-destruction after expiration.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00023cloud computingaccess controlattribute-based encryptionmulti-authority,user revocation
spellingShingle Liang-xuan ZHANG
Hui LI
Multi-authority attribute-based encryption with efficient user revocation in cloud computing
网络与信息安全学报
cloud computing
access control
attribute-based encryption
multi-authority,user revocation
title Multi-authority attribute-based encryption with efficient user revocation in cloud computing
title_full Multi-authority attribute-based encryption with efficient user revocation in cloud computing
title_fullStr Multi-authority attribute-based encryption with efficient user revocation in cloud computing
title_full_unstemmed Multi-authority attribute-based encryption with efficient user revocation in cloud computing
title_short Multi-authority attribute-based encryption with efficient user revocation in cloud computing
title_sort multi authority attribute based encryption with efficient user revocation in cloud computing
topic cloud computing
access control
attribute-based encryption
multi-authority,user revocation
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00023
work_keys_str_mv AT liangxuanzhang multiauthorityattributebasedencryptionwithefficientuserrevocationincloudcomputing
AT huili multiauthorityattributebasedencryptionwithefficientuserrevocationincloudcomputing