A Flexible Secure Key Delegation Mechanism for CP-ABE with Hidden Access Structure
Title | A Flexible Secure Key Delegation Mechanism for CP-ABE with Hidden Access Structure |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Porwal, Shardha, Mittal, Sangeeta |
Conference Name | 2019 11th International Conference on Information Technology and Electrical Engineering (ICITEE) |
Date Published | Oct. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-4055-1 |
Keywords | Access Control, anonymity, authorisation, ciphertext policy attribute, Collaboration, CP-ABE, CP-ABE schemes, cryptography, Encryption, fine grained access control, flexible secure key delegation mechanism, Generators, hidden access policy, hidden access structure, key delegation, Logic gates, Organizations, policy-based governance, pubcrawl, Public key, Scalability, specified access control, storage management, unauthorized data access |
Abstract | Ciphertext Policy Attribute Based Encryption techniques provide fine grained access control to securely share the data in the organizations where access rights of users vary according to their roles. We have noticed that various key delegation mechanisms are provided for CP-ABE schemes but no key delegation mechanism exists for CP-ABE with hidden access policy. In practical, users' identity may be revealed from access policy in the organizations and unlimited further delegations may results in unauthorized data access. For maintaining the users' anonymity, the access structure should be hidden and every user must be restricted for specified further delegations. In this work, we have presented a flexible secure key delegation mechanism for CP-ABE with hidden access structure. The proposed scheme enhances the capability of existing CP-ABE schemes by supporting flexible delegation, attribute revocation and user revocation with negligible enhancement in computational cost. |
URL | https://ieeexplore.ieee.org/document/8929949 |
DOI | 10.1109/ICITEED.2019.8929949 |
Citation Key | porwal_flexible_2019 |
- hidden access policy
- unauthorized data access
- storage management
- specified access control
- Scalability
- Public key
- pubcrawl
- policy-based governance
- Organizations
- Logic gates
- key delegation
- hidden access structure
- Access Control
- Generators
- flexible secure key delegation mechanism
- fine grained access control
- encryption
- Cryptography
- CP-ABE schemes
- CP-ABE
- collaboration
- ciphertext policy attribute
- authorisation
- anonymity