Key-policy attribute-based encryption against continual auxiliary input leakage

Attribute-based encryption mechanism can achieve very flexible access control, so it has a wide range of applications in the distributed environment, such as fine-grained access control, audit log applications, cloud storage systems. Key-policy attribute-based encryption (KP-ABE) scheme is especiall...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Information sciences Ročník 470; s. 175 - 188
Hlavní autoři: Li, Jiguo, Yu, Qihong, Zhang, Yichen, Shen, Jian
Médium: Journal Article
Jazyk:angličtina
Vydáno: Elsevier Inc 01.01.2019
Témata:
ISSN:0020-0255, 1872-6291
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:Attribute-based encryption mechanism can achieve very flexible access control, so it has a wide range of applications in the distributed environment, such as fine-grained access control, audit log applications, cloud storage systems. Key-policy attribute-based encryption (KP-ABE) scheme is especially suitable for video on demand, pay TV, etc. Most of the existing KP-ABE schemes do not consider the side channel attacks which probably leak some secret information about the cryptosystems. In the paper, we present the formal definition and security model of key-policy attribute-based encryption scheme which is resilient to continual auxiliary input (CAI) leakage. What is more, we present a concrete KP-ABE scheme. The proposed scheme is proved secure under the static assumptions.
ISSN:0020-0255
1872-6291
DOI:10.1016/j.ins.2018.07.077