An Access Control Scheme with Dynamic User Management and Cloud-Aided Decryption

Jiaoli Shi,Chuanhe Huang,Jing Wang,Kai He,Xieyang Shen
DOI: https://doi.org/10.1002/sec.1725
IF: 1.968
2016-01-01
Security and Communication Networks
Abstract:Ciphertext-policy attribute-based encryption is becoming a cryptographic solution to realize fine-grained access control. However, some important problems have not been effectively solved yet such as (i) low efficiency of dynamic change of a user or his attribute and (ii) high computation cost at user end. In this paper, we propose an access control scheme with dynamic user management using a version key and especially realize direct cloud-aided attribute revocation without updating another user's key or re-encrypting ciphertexts. We present a cloud-aided decryption method with which most of decrypting work can be transferred to cloud. Compared with the existing schemes, our scheme causes less computation cost at user end and supports efficient dynamic change of a user or his attribute. Simulation indicates that our direct cloud-aided attribute revocation method takes less time. Copyright (C) 2017 John Wiley & Sons, Ltd.
What problem does this paper attempt to address?