Online/Offline Traceable Attribute-Based Encryption

被引:0
作者
Zhang K. [1 ]
Ma J. [2 ]
Zhang J. [2 ]
Ying Z. [3 ]
Zhang T. [2 ]
Liu X. [4 ]
机构
[1] School of Telecommunications Engineering, Xidian University, Xi'an
[2] School of Computer Science and Technology, Xidian University, Xi'an
[3] School of Computer Science and Technology, Anhui University, Hefei
[4] School of Information Systems, Singapore Management University, Singapore
来源
Ma, Jianfeng (jfma@mail.xidian.edu.cn) | 2018年 / Science Press卷 / 55期
基金
中国国家自然科学基金;
关键词
Attribute-based encryption (ABE); Large universe; Online/offline; Standard model; Traceability;
D O I
10.7544/issn1000-1239.2018.20160799
中图分类号
学科分类号
摘要
Attribute-based encryption (ABE), as a public key encryption, can be utilized for fine-grained access control. However, there are two main drawbacks that limit the applications of attribute-based encryption. First, as different users may have the same decryption privileges in ciphertext-policy attribute-based encryption, it is difficult to catch the users who sell their secret keys for financial benefit. Second, the number of resource-consuming exponentiation operations required to encrypt a message in ciphertext-policy attribute-based encryption grows with the complexity of the access policy, which presents a significant challenge for the users who encrypt data on mobile devices. Towards this end, after proposing the security model for online/offline traceable attribute-based encryption, we present an online/offline traceable ciphertext-policy attribute-based encryption scheme in prime order bilinear groups, and further prove that it is selectively secure in the standard model. If a malicious user leaks his/her secret key to others for benefit, he/she will be caught by a tracing algorithm in our proposed scheme. Extensive efficiency analysis results indicate that the proposed scheme moves the majority cost of an encryption into the offline encryption phase and is suitable for user encryption on mobile devices. In addition, the proposed scheme supports large universe of attributes, which makes it more flexible for practical applications. © 2018, Science Press. All right reserved.
引用
收藏
页码:216 / 224
页数:8
相关论文
共 18 条
  • [1] Sahai A., Waters B., Fuzzy identity-based encryption, Proc of EUROCRYPT'05, pp. 457-473, (2005)
  • [2] Bethencourt J., Sahai A., Waters B., Ciphertext-policy attribute-based encryption, Proc of IEEE Symp on Security and Privacy, pp. 321-334, (2007)
  • [3] Goyal V., Pandey O., Sahai A., Et al., Attribute-based encryption for fine-grained access control of encrypted data, Proc of the 13th ACM Conf on Computer and Communications Security, pp. 89-98, (2006)
  • [4] Waters B., Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, Proc of PKC'11, pp. 53-70, (2011)
  • [5] Lewko A., Okamoto T., Sahai A., Et al., Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption, Proc of EUROCRYPT'10, pp. 62-91, (2010)
  • [6] Okamoto T., Takashima K., Fully secure functional encryption with general relations from the decisional linear assumption, Proc of CRYPTO'10, pp. 191-208, (2010)
  • [7] Hinek M.J., Jiang S., Safavi-Naini R., Et al., Attribute-based encryption with key cloning protection
  • [8] Li J., Ren K., Kim K., A2BE: Accountable attribute-based encryption for abuse free access control
  • [9] Liu Z., Cao Z., Wong D.S., White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures, IEEE Trans on Information Forensics and Security, 8, 1, pp. 76-88, (2013)
  • [10] Liu Z., Cao Z., Wong D.S., Traceable CP-ABE: How to trace decryption devices found in the wild, IEEE Trans on Information Forensics and Security, 10, 1, pp. 55-68, (2015)