Revocable and Secure Multi-Authority Attribute- Encryption Scheme


  • Addapalli V. N. Krishna Professor, CSE Dept, School of Engineering and Technology, CHRIST (Deemed to be University), Bangalore
  • Ancy P. R. Research Scholar, CSE Dept, School of Engineering and Technology, CHRIST (Deemed to be University)


Multi-Authority CP-ABE, Access policy, Elliptic curve cryptography, Revocation, Lagrange interpolation


Security is an important factor as nowadays many systems generates and process huge amount of data. This also leads many of us to rely on a third-party service provider for storing sensitive and confidential data. Providing outsourcing means the data owner will encrypt and store the data in a third-party storage system. In this paper, we are proving solutions for two main problems. The first issue is what if the attribute authority itself can access the data because the attributes and secret keys are known by attribute. This issue is called the key escrow problem. For solving it we are proposing a multi-authority system with Elliptic Curve Cryptography. The second issue that we addressed in this paper is the revocation problem, which means when someone leaves the system should be prohibited from accessing subsequent data this is called forward security and as a second case when someone joins the system should be prevented from accessing previous shared date this is called backward security. In this paper, we address both forward and backward security. For solving this problem we are using the concept of the Lagrange interpolation technique for generating and verifying secret keys. Based on this technique secret key will be dynamically altered and used for encryption and due to this can  achieve greater security.


Download data is not yet available.


J. Bethencourt, A. S. Ucla, and B. Waters, “Ciphertext-Policy Attribute-Based Encryption.”

B. Waters, “Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization.”

A. Lewko and B. Waters, “Decentralizing Attribute-Based Encryption.”

Z. Liu, J. Xu, Y. Liu, and B. Wang, “Updatable Ciphertext-Policy Attribute-Based Encryption Scheme with Traceability and Revocability,” IEEE Access, vol. 7, pp. 66832–66844, 2019, doi: 10.1109/ACCESS.2019.2918434.

A. Sahai and B. Waters, “Fuzzy Identity-Based Encryption,” pp. 457–473, 2005.

S. Fugkeaw, “A Lightweight Policy Update Scheme for Outsourced Personal Health Records Sharing,” IEEE Access, vol. 9, pp. 54862–54871, 2021, doi: 10.1109/ACCESS.2021.3071150.

Y. Ming, B. He, and C. Wang, “Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage,” IEEE Access, vol. 9, pp. 42593–42603, 2021, doi: 10.1109/ACCESS.2021.3066212.

J. Li, N. Chen, and Y. Zhang, “Extended file hierarchy access control scheme with attribute-based encryption in cloud computing,” IEEE Trans Emerg Top Comput, vol. 9, no. 2, pp. 983–993, Apr. 2021, doi: 10.1109/TETC.2019.2904637.

L. K. Jie and H. Kamarulhaili, “Polynomial interpolation in the elliptic curve cryptosystem,” J Math Stat, vol. 7, no. 4, pp. 326–331, Jan. 2011, doi: 10.3844/jmssp.2011.326.331.

K. Sudhamani, P. Rama Rao, & R. Vara Prasad. (2016). Secure Auditing and Deduplicating Data in Cloud. International Journal of Computer Engineering In Research Trends, 3(1), 1-5.

B. Applebaum and O. Nir, “Upslices, Downslices, and Secret-Sharing with Complexity of 1.5 n,” 2021.

J. Wei, W. Liu and X. Hu, "Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage," in IEEE Systems Journal, vol. 12, no. 2, pp. 1731-1742, June 2018.

D. Han, N. Pan, and K. C. Li, “A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection,” IEEE Trans Dependable Secure Comput, vol. 19, no. 1, pp. 316–327, 2022, doi: 10.1109/TDSC.2020.2977646.

S. Tu, M. Waqas, F. Huang, G. Abbas, and Z. H. Abbas, “A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing,” Computer Networks, vol. 195, Aug. 2021, doi: 10.1016/j.comnet.2021.108196.

Budhhe, A., & Hajare, H. R. (2016). Secure Data Communication Using IDEA for Decentralized Disruption-Tolerant Military Networks. International Journal of Computer Engineering in Research Trends, 3(12), 625-628.

C. Ge, W. Susilo, J. Baek, Z. Liu, J. Xia, and L. Fang, “Revocable Attribute-Based Encryption with Data Integrity in Clouds,” IEEE Trans Dependable Secure Comput, 2021, doi: 10.1109/TDSC.2021.3065999.

Maloth, Bhavsingh, K. Pavan Kumar, G. Nirusha, and C. Vijaya Mohan. "Discrete Keyword Search in Cloud Computing over Attribute Based Encryption." International Journal of Computer Science Engineering & Technology 2, no. 3 (2012).

A. P. R and A. v N Krishna, “An Efficient Nonlinear Access Policy Based On Quadratic Residue For Ciphertext Policy Attribute Based Encryption,” J Theor Appl Inf Technol, vol. 15, no. 21, 2021, [Online]. Available:

K. Yang and X. Jia, “Expressive, efficient, and revocable data access control for multi-authority cloud storage,” IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 7, pp. 1735–1744, Jul. 2014.

D, B. S. and P, V. K. (2023) “Digital Railway Ticketing Using Ethereum and Smart contracts”, International Journal of Computer Engineering in Research Trends, 10(4), pp. 167–171. doi: 10.22362/ijcertpublications.v10i4.10.

J. Gu, J. Shen, and B. Wang, “A robust and secure multi-authority access control system for cloud storage,” Peer Peer Netw Appl, vol. 14, no. 3, pp. 1488–1499, May 2021, doi: 10.1007/s12083-020-01055-5.

P. S. Challagidad and M. N. Birje, “Efficient Multi-authority Access Control using Attribute-based Encryption in Cloud Storage,” in Procedia Computer Science, 2020, vol. 167, pp. 840–849. doi: 10.1016/j.procs.2020.03.423.

L. Zhang, Y. Ye, and Y. Mu, “Multiauthority Access Control with Anonymous Authentication for Personal Health Record,” IEEE Internet Things J, vol. 8, no. 1, pp. 156–167, Jan. 2021, doi: 10.1109/JIOT.2020.3000775.

G. K. Sandhia and S. V. K. Raja, “Secure sharing of data in cloud using MA-CPABE with elliptic curve cryptography,” J Ambient Intell Humaniz Comput, vol. 13, no. 8, pp. 3893–3902, Aug. 2022, doi: 10.1007/s12652-021-03287-6.

A. Beimel and Y. Ishai, “On the power of nonlinear secret-sharing,” SIAM J Discret Math, vol. 19, no. 1, pp. 258–280, 2005, doi: 10.1137/S0895480102412868.

K. Lee, “Revocable hierarchical identity-based encryption with adaptive security,” Theor Comput Sci, vol. 880, pp. 37–68, Aug. 2021, doi: 10.1016/j.tcs.2021.05.034.

K. Dhal, S. C. Rai, P. K. Pattnaik, and S. Tripathy, “CEMAR: a fine grained access control with revocation mechanism for centralized multi-authority cloud storage,” Journal of Supercomputing, vol. 78, no. 1, pp. 987–1009, Jan. 2022, doi: 10.1007/s11227-021-03908-z.

C. Wang, H. Jin, R. Wei, and K. Zhou, “Revocable, dynamic and decentralized data access control in cloud storage,” Journal of Supercomputing, vol. 78, no. 7, pp. 10063–10087, May 2022, doi: 10.1007/s11227-021-04277-3.

System Architecture.




How to Cite

A. V. N. . Krishna and A. . P. R., “Revocable and Secure Multi-Authority Attribute- Encryption Scheme”, Int J Intell Syst Appl Eng, vol. 11, no. 6s, pp. 52–58, May 2023.



Research Article