Skip to main content

Study of Encryption Strategy Based on Multi Owner Attribute

  • Conference paper
  • First Online:
Computer Science and Education. Computer Science and Technology (ICCSE 2023)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 2023))

Included in the following conference series:

  • 183 Accesses

Abstract

The encryption mechanism based on attribute regards a series of attribute sets as the user's identity, associates the ciphertext, private key with attributes and access policies, and uses Boolean expression to represent the access policy to realize fine-grained access control. When the attribute set identifies a user meets the access structure, the user can decrypt the ciphertext with his private key. This paper proposes a multi owner attribute encryption scheme of access structure. The access policies are divided into zoom-in mode and zoom-out mode. In multi owner attribute encryption, multiple owners can jointly control the control strategy of ciphertext, which is suitable for multi author scenarios. The simulation and performance analysis verify the effectiveness and efficiency of the proposed scheme in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mollah, M.B., Islam, K.R., Islam, S.S.: Next generation of computing through cloud computing technology. In: IEEE Conference of Electrical & Computer Engineering. Montreal, QC, Canada, pp. 1–6. IEEE (2012)

    Google Scholar 

  2. Fan, Y., Wu, X.: Ciphertext-policy attribute-based encryption access control scheme for cloud storage. Appl. Res. Comput. 35(08), 2412–2416 (2018)

    Google Scholar 

  3. You, W., Zhang, L., Ye, Y., Li, H.: Privacy-preserving attribute-based dynamic broadcast encryption mechanism in multi-user communication system. Netinfo Secur. 21(4), 21–30 (2021)

    Google Scholar 

  4. Wei, D., Gao, H.: A ciphtext-policy Attribute-based Encryption scheme supporting arithmetic span program. ACTA Electron. Sinca 48(10), 1993–2002 (2022)

    Google Scholar 

  5. Yang, N., Teng, W., Han, B., Huang, S.: Attribute-based encryption access control scheme of multiple attribute center with constant size ciphertexts. Comput. Eng. Des. 40(10), 2766–2772 (2019)

    Google Scholar 

  6. Chen, L., Li, J., Zhang, Y.: Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext. Soft Comput. 24(6), 4589–4606 (2020)

    Article  Google Scholar 

  7. Han, X.: Research on attribute-based encryption in data sharing in cloud. Beijing University of Posts and Telecommunications (2021)

    Google Scholar 

  8. Tu, Y., Gao, Z., Li, R.: Removable attribute encryption access control algorithm based on CP-ABE. Comput. Sci. 45(11), 176–179 (2018)

    Google Scholar 

  9. Hao, J., Huang, C., Ni, J., Rong, H., Xian, M., Shen, X.: Fine-grained data access control with attribute-hiding policy for cloud-based IoT. Comput. Networks 153, 1–10 (2018)

    Article  Google Scholar 

  10. Gu, B., Ma, J.: A Secure storage method for unstructured big data using revocable attribute encryption combined with fast density clustering algorithm. Comput. Appl. Softw. 38(5), 337–343 (2021)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhong Zong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zong, Z. (2024). Study of Encryption Strategy Based on Multi Owner Attribute. In: Hong, W., Kanaparan, G. (eds) Computer Science and Education. Computer Science and Technology. ICCSE 2023. Communications in Computer and Information Science, vol 2023. Springer, Singapore. https://doi.org/10.1007/978-981-97-0730-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-0730-0_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-0729-4

  • Online ISBN: 978-981-97-0730-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics