DIKUL - logo
E-resources
Full text
Peer reviewed Open access
  • Revocable Ciphertext-Policy...
    YU Jinxia, YANG Chaochao, ZHANG Qichao, YAN Xixi

    Jisuanji kexue yu tansuo, 02/2020, Volume: 14, Issue: 2
    Journal Article

    Attribute-based encryption mechanism is widely used in outsourcing environment because of its charac-teristics of “one-to-many” communication. However, users attributes often change dynamically. In order to solve the problem of attribute revocation in the attribute-based encryption scheme in the outsourcing systems, combined with the attribute-based encryption scheme proposed by Yan et al., a revocable ciphertext-policy attribute-based encryption in data outsourcing systems from lattices is introduced. The scheme uses the LWE (learning with error) problem to construct the encryption and decryption algorithm, which can resist the quantum attack. Tree-access structure is adopted to realize flexible fine-grained access strategy. In addition, with the help of the data outsourcing management server, the attribute key and ciphertext are updated to achieve immediate attribute revocation. The scheme is proven to satisfy the security under the selective attribute and selective plaintext attack. The comparative analysi