Key Cooperative Attribute-Based Encryption

被引:0
作者
Huang, Luqi [1 ]
Susilo, Willy [1 ]
Yang, Guomin [2 ]
Guo, Fuchun [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW, Australia
[2] Singapore Management Univ, Sch Comp & Informat Syst, Singapore, Singapore
来源
INFORMATION SECURITY AND PRIVACY, PT I, ACISP 2024 | 2024年 / 14895卷
基金
澳大利亚研究理事会;
关键词
Attribute-based encryption; Key management; Key cooperative; Trust delegation; MULTI-AUTHORITY;
D O I
10.1007/978-981-97-5025-2_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) is an important technology in building access control systems with precise control and scalability. In an ABE system, there exists a private key generator (PKG) that issues all private keys. The PKG has a significant drawback referred to as the huge key management burden in large-scale user systems. To overcome this limitation, we propose a more flexible system that offers users the choice to utilize decryption keys either from the PKG or from trusted users to decrypt the ciphertext, reducing the workload of the PKG. Unfortunately, users are restricted to only receiving private keys from the PKG in most ABE schemes. Thus, our system ABE extends the ability of trusted users to generate and distribute decryption keys. Furthermore, decryption keys from trusted users possess equivalent decryption with a private key from the PKG when satisfying the cooperative access policy set by the encryptor. We define the concept of key cooperative ABE for the first time, presenting a key cooperative ABE scheme.
引用
收藏
页码:241 / 260
页数:20
相关论文
共 27 条
[1]  
Ashley M., 1999, The gnu privacy handbook
[2]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[3]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[4]   Chosen-ciphertext security from identity-based encryption [J].
Canetti, R ;
Halevi, S ;
Katz, J .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 :207-222
[5]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[6]   Server-Aided Revocable Attribute-Based Encryption [J].
Cui, Hui ;
Deng, Robert H. ;
Li, Yingjiu ;
Qin, Baodong .
COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 :570-587
[7]  
Freire ESV, 2013, LECT NOTES COMPUT SC, V7778, P254, DOI 10.1007/978-3-642-36362-7_17
[8]   Registration-Based Encryption: Removing Private-Key Generator from IBE [J].
Garg, Sanjam ;
Hajiabadi, Mohammad ;
Mahmoody, Mohammad ;
Rahimi, Ahmadreza .
THEORY OF CRYPTOGRAPHY, TCC 2018, PT I, 2018, 11239 :689-718
[9]  
Goyal V, 2008, LECT NOTES COMPUT SC, V5126, P579, DOI 10.1007/978-3-540-70583-3_47
[10]   Registered Attribute-Based Encryption [J].
Hohenberger, Susan ;
Lu, George ;
Waters, Brent ;
Wu, David J. .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT III, 2023, 14006 :511-542