Abstract:
Focused on the issue that users' privilege changes and users leak their private keys intentionally or unintentionally in attribute-based encryption(ABE) system, a traceable and attribute revocable scheme was proposed in ciphertext policy attribute-based encryption(CP-ABE). After tracing user's ID, the user's one or several attributes was revoked to control the user's privilege. The technology Shamir threshold scheme was used to trace the user's ID and put the ID into the attributes revocation lists. The attributes revocation lists were input by the encryptor when running the encrypt algorithm. Finally tracing and direct fine grained revocation were accomplished, and the scheme selective security in the dual system encryption was proved.