Computer and Modernization

Previous Articles     Next Articles

Hidden Attribute Outsourced Decryption Access Control Scheme Based on CP-ABE

  

  1.  (College of Mathematics and System Science, Xinjiang University, Urumqi 830046, China)
  • Received:2017-10-17 Online:2018-06-13 Published:2018-06-13

Abstract: In conventional attribute-based encryption schemes, the data owner embeds the access structure to the ciphertext, thus the user receives the ciphertext with the access structure, however the access structure itself might contain private information of the data owner. This paper proposes a hidden attribute outsourced decryption access control scheme based on CP-ABE (Ciphertext-Policy Attribute-Based Encryption). The scheme can not only hide the attributes of the access control policy specified by the data owner, but also deliver the computation intensive decryption operations to the proxy server and guarantee that the unauthorized attribute authorization center or the proxy server can not decrypt the shared encrypted data alone.

Key words: hidden attribute, outsourced decryption, ciphertext-policy attribute-based encryption, access control

CLC Number: