Provably secure role-based encryption with revocation mechanism

Yan Zhu, Hong Xin Hu, Gail-Joon Ahn, Huai Xi Wang, Shan Biao Wang

Research output: Contribution to journalArticlepeer-review

21 Scopus citations

Abstract

Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hierarchical RBAC model. In this paper, we present a practical RBE scheme with revocation mechanism based on partial-order key hierarchy with respect to the public key infrastructure, in which each user is assigned with a unique private-key to support user identification, and each role corresponds to a public group-key that is used to encrypt data. Based on this key hierarchy structure, our RBE scheme allows a sender to directly specify a role for encrypting data, which can be decrypted by all senior roles, as well as to revoke any subgroup of users and roles. We give a full proof of security of our scheme against hierarchical collusion attacks. In contrast to the existing solutions for encrypted file systems, our scheme not only supports dynamic joining and revoking users, but also has shorter ciphertexts and constant-size decryption keys.

Original languageEnglish (US)
Pages (from-to)697-710
Number of pages14
JournalJournal of Computer Science and Technology
Volume26
Issue number4
DOIs
StatePublished - Jul 2011

Keywords

  • Collusion Security
  • Cryptography
  • Revocation
  • Role HierarchyKey Hierarchy
  • Role-Based Encryption

ASJC Scopus subject areas

  • Software
  • Theoretical Computer Science
  • Hardware and Architecture
  • Computer Science Applications
  • Computational Theory and Mathematics

Fingerprint

Dive into the research topics of 'Provably secure role-based encryption with revocation mechanism'. Together they form a unique fingerprint.

Cite this