Abstract
The encryption mechanism based on attribute regards a series of attribute sets as the user's identity, associates the ciphertext, private key with attributes and access policies, and uses Boolean expression to represent the access policy to realize fine-grained access control. When the attribute set identifies a user meets the access structure, the user can decrypt the ciphertext with his private key. This paper proposes a multi owner attribute encryption scheme of access structure. The access policies are divided into zoom-in mode and zoom-out mode. In multi owner attribute encryption, multiple owners can jointly control the control strategy of ciphertext, which is suitable for multi author scenarios. The simulation and performance analysis verify the effectiveness and efficiency of the proposed scheme in this paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mollah, M.B., Islam, K.R., Islam, S.S.: Next generation of computing through cloud computing technology. In: IEEE Conference of Electrical & Computer Engineering. Montreal, QC, Canada, pp. 1–6. IEEE (2012)
Fan, Y., Wu, X.: Ciphertext-policy attribute-based encryption access control scheme for cloud storage. Appl. Res. Comput. 35(08), 2412–2416 (2018)
You, W., Zhang, L., Ye, Y., Li, H.: Privacy-preserving attribute-based dynamic broadcast encryption mechanism in multi-user communication system. Netinfo Secur. 21(4), 21–30 (2021)
Wei, D., Gao, H.: A ciphtext-policy Attribute-based Encryption scheme supporting arithmetic span program. ACTA Electron. Sinca 48(10), 1993–2002 (2022)
Yang, N., Teng, W., Han, B., Huang, S.: Attribute-based encryption access control scheme of multiple attribute center with constant size ciphertexts. Comput. Eng. Des. 40(10), 2766–2772 (2019)
Chen, L., Li, J., Zhang, Y.: Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext. Soft Comput. 24(6), 4589–4606 (2020)
Han, X.: Research on attribute-based encryption in data sharing in cloud. Beijing University of Posts and Telecommunications (2021)
Tu, Y., Gao, Z., Li, R.: Removable attribute encryption access control algorithm based on CP-ABE. Comput. Sci. 45(11), 176–179 (2018)
Hao, J., Huang, C., Ni, J., Rong, H., Xian, M., Shen, X.: Fine-grained data access control with attribute-hiding policy for cloud-based IoT. Comput. Networks 153, 1–10 (2018)
Gu, B., Ma, J.: A Secure storage method for unstructured big data using revocable attribute encryption combined with fast density clustering algorithm. Comput. Appl. Softw. 38(5), 337–343 (2021)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zong, Z. (2024). Study of Encryption Strategy Based on Multi Owner Attribute. In: Hong, W., Kanaparan, G. (eds) Computer Science and Education. Computer Science and Technology. ICCSE 2023. Communications in Computer and Information Science, vol 2023. Springer, Singapore. https://doi.org/10.1007/978-981-97-0730-0_2
Download citation
DOI: https://doi.org/10.1007/978-981-97-0730-0_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-0729-4
Online ISBN: 978-981-97-0730-0
eBook Packages: Computer ScienceComputer Science (R0)