Abstract
Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hierarchical RBAC model. In this paper, we present a practical RBE scheme with revocation mechanism based on partial-order key hierarchy with respect to the public key infrastructure, in which each user is assigned with a unique private-key to support user identification, and each role corresponds to a public group-key that is used to encrypt data. Based on this key hierarchy structure, our RBE scheme allows a sender to directly specify a role for encrypting data, which can be decrypted by all senior roles, as well as to revoke any subgroup of users and roles. We give a full proof of security of our scheme against hierarchical collusion attacks. In contrast to the existing solutions for encrypted file systems, our scheme not only supports dynamic joining and revoking users, but also has shorter ciphertexts and constant-size decryption keys.
Original language | English (US) |
---|---|
Pages (from-to) | 697-710 |
Number of pages | 14 |
Journal | Journal of Computer Science and Technology |
Volume | 26 |
Issue number | 4 |
DOIs | |
State | Published - Jul 2011 |
Keywords
- Collusion Security
- Cryptography
- Revocation
- Role HierarchyKey Hierarchy
- Role-Based Encryption
ASJC Scopus subject areas
- Software
- Theoretical Computer Science
- Hardware and Architecture
- Computer Science Applications
- Computational Theory and Mathematics