A cloud-based access control scheme with user revocation and attribute update

Peng Zhang*, Zehong Chen, Kaitai Liang, Shulan Wang, Ting Wang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

31 Citations (Scopus)


Ciphertext-policy attribute-based encryption (CP-ABE) is a well-known cryptographic technology for guaranteeing data confidentiality but also fine-grained data access control. It enables data owners to define flexible access policy for cloud-based data sharing. However, the user revocation and attribute update problems existing in CP-ABE systems that are long-standing unsolved in the literature. In this paper, we propose the first access control (CP-ABE) scheme supporting user revocability and attribute update. Specifically, the user revocation is defined in the identity-based setting that does not conflict our attribute-based design. The cost brought by attribute update is efficient in the sense that we only concentrate on the update of the ciphertexts associated with the corresponding updated attribute. Moreover, the security analysis shows that the proposed scheme is secure under the decisional Bilinear Diffie-Hellman assumption.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings
PublisherSpringer Verlag
Number of pages16
ISBN (Print)9783319402529
Publication statusPublished - 2016
MoE publication typeA4 Article in a conference publication
EventAustralasian Conference on Information Security and Privacy - Melbourne, Australia
Duration: 4 Jul 20166 Jul 2016
Conference number: 21

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)03029743
ISSN (Electronic)16113349


ConferenceAustralasian Conference on Information Security and Privacy
Abbreviated titleACISP


  • Access control
  • Attribute update
  • Attribute-based encryption
  • Cloud
  • User revocability


Dive into the research topics of 'A cloud-based access control scheme with user revocation and attribute update'. Together they form a unique fingerprint.

Cite this