作者: Amit Sahai , Hakan Seyalioglu , Brent Waters
DOI: 10.1007/978-3-642-32009-5_13
关键词: Access control 、 Revocation 、 On-the-fly encryption 、 Encryption 、 Semantic security 、 Access structure 、 Computer science 、 Delegation 、 Pairing 、 Key (cryptography) 、 Computer security 、 Ciphertext 、 Attribute-based encryption 、 Ciphertext indistinguishability
摘要: Motivated by the question of access control in cloud storage, we consider problem using Attribute-Based Encryption ABE a setting where users' credentials may change and ciphertexts be stored third party. Our main result is obtained pairing two contributions:We first ask how party who not trusted with secret key information can process ciphertext to disqualify revoked users from decrypting data encrypted past. core tool new procedure called delegation that allows 're-encrypted' more restrictive policy only public information.Second, study revocable attribute-based encryption. We provide fully secure construction modifying an encryption scheme due Lewko et al. [9] prove security standard model. We then combine these results for approach revocation on data. storage server update accessing was before user's while broadcasts dynamically revoke selected users.