灵活撤销

  1. Direct revocation The DO encrypts files with a separate revocation list (as a policy), preventing revoked users from decrypting the ciphertext while non-revoked DUs remain unaffected. However, all DOs must maintain an ever-growing revocation list, increasing ciphertext size over time.

Limitations:

  • Ciphertext size is linearly increasing with the number of revoked users.
  • Users are represented with a unique ID. No anonymous.
  1. Indirect revocation A timestamp is embedded in the ciphertext, and the KGC periodically updates the private keys of non-revoked DUs. Revoked DUs cannot obtain valid key updates to decrypt future ciphertexts.

Q: The revoked users can decrypt past ciphertexts they were originally allowed to.

  • 系统周期性地维护密钥
  • 密钥使用次数

另一种分类

  1. Attribute revocation

Attribute-based fine-grained access control with efficient revocation in cloud storage systems

Kan Yang, Xiaohua Jia, Kui Ren, ASIACCS ‘13

每个属性对应一个版本号,当一个用户的属性A被撤销时,更新系统中属性A的版本号。随后更新未被撤销的用户的密钥里与属性A相关的组件(Authority),以及系统中密文里和属性A相关的组件(更新密文在CS)。

  1. User revocation

HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing

Zhiguo Wan, Jun’e Liu, and Robert H. Deng, TIFS'2012

在密文和密钥中添加expiration time,如果密钥中的expiration time大于密文中的expiration time,可以解密。数字比较实用“bag of bits”,即将数字转为二进制,构建访问树。更新用户密钥只更新expiration time相关的组件

用户密钥没有被删除;authority每次执行密钥更新;需要安全信道

EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation

Sonia Jahid, Prateek Mittal, Nikita Borisov, ASIACCS ‘11

引入一个trusted proxy在做密文转换时实现撤销,撤销使用“Efficient trace and revoke schemes”中的方法。不需要更新用户密钥,不需要更新密文。

只支持有限个用户,系统设置好的t个用户。trusted proxy

Optimized Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation

Yang Li, Jianming Zhu, Xiuli Wang, Yanmei Chai and Shuai Shao, International Journal of Security and Its Applications

维护一个撤销后的用户ID集合,加密密文时嵌入到访问策略,用户密钥中有和ID相关的组件,如果已被撤销,则无法解密

Ciphertext delegation: The storage server to periodically update the timestamps in all ciphertexts. (Dynamic credentials and ciphertext delegation for attribute-based encryption, CRYPTO 2012)

Limitations:

  • all non-revoked users periodically update their keys;
  • The storage server needs to periodically perform (unscalable) ciphertext delegation to prevent revoked users from decrypting past ciphertexts.

公共可验证外包解密

Sanitize原理

考虑更多sender恶意的情况?