Mitigating key escrow in attribute-based encryption

被引:0
|
作者
Wang, Yongtao [1 ]
Liu, Xiaonan [1 ]
Liang, Lulu [1 ]
Feng, Weiduan [1 ]
Yang, Guang [1 ]
机构
[1] China Information Technology Security Evaluation Center, Beijing, China
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of accountable authority introduced by Goyal (Crypto 2007) in identity-based encryption (IBE) setting is a novel approach to mitigate the (inherent) key escrow problem in identity based cryptosystems. As far as we know, the (inherent) key escrow problem also exists in attribute based encryption (ABE), for example cipher-text policy ABE (CP-ABE). In this paper, the concept of accountable authority is generalized to ABE setting. We first formalize the definitions and security models for accountable authority attribute-based encryption (A-ABE), and then present two concrete constructions. One is designed for the threshold ABE with large universe attributes, and the other is built for ciphertext policy ABE. In our scheme, a user will be identified by a pair (id, ω), where id denotes the identity of a user and ω denotes a attribute set associated to the user. In addition, both constructions are shown to be secure in the standard model under some reasonable assumptions.
引用
收藏
页码:94 / 102
相关论文
共 50 条
  • [1] Accountable attribute-based encryption scheme without key escrow
    Zhang, Xing
    Wen, Zilong
    Shen, Qingni
    Fang, Yuejian
    Wu, Zhonghai
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2293 - 2303
  • [2] Generic Construction of Outsourced Attribute-Based Encryption Without Key Escrow
    Chen, Yang
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zhengping
    IEEE ACCESS, 2018, 6 : 58955 - 58966
  • [3] Efficient Revocable Attribute-Based Encryption with Data Integrity and Key Escrow-Free
    Huang, Meijuan
    Liu, Yutian
    Yang, Bo
    Zhao, Yanqi
    Zhang, Mingrui
    INFORMATION, 2024, 15 (01)
  • [4] Removing escrow from ciphertext policy attribute-based encryption
    Hur, Junbeom
    Koo, Dongyoung
    Hwang, Seong Oun
    Kang, Kyungtae
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2013, 65 (09) : 1310 - 1317
  • [5] Key Cooperative Attribute-Based Encryption
    Huang, Luqi
    Susilo, Willy
    Yang, Guomin
    Guo, Fuchun
    INFORMATION SECURITY AND PRIVACY, PT I, ACISP 2024, 2024, 14895 : 241 - 260
  • [6] Revocable Attribute-based Encryption with Escrow-free in Cloud Storage
    Zhao Zhiyuan
    Zhu Zhiqiang
    Wang Jianhua
    Sun Lei
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (01) : 1 - 10
  • [7] Towards Key-Escrow Free Attribute-Based Encryption for Self-Sovereign Identity Systems
    Thong, Zhengxi
    Yan, Hongyang
    Koe, Arthur Sandor Voundi
    Deng, Weichu
    Li, Junyang
    2024 IEEE/ACM 32ND INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE, IWQOS, 2024,
  • [8] Attribute-Based Key-Insulated Encryption
    Chen, Jian-Hong
    Wang, Yong-Tao
    Chen, Ke-Fei
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (02) : 437 - 449
  • [9] Unbounded Attribute-Based Encryption Supporting Non-Monotonic Access Structure and Traceability without Key Escrow
    Zhou, Yan
    Peng, Changgen
    Tian, Youliang
    Li, Zuolong
    Tan, Weijie
    MOBILE NETWORKS & APPLICATIONS, 2023, 28 (05): : 1625 - 1635
  • [10] Mitigating the One-Use Restriction in Attribute-Based Encryption
    Kowalczyk, Lucas
    Liu, Jiahui
    Malkin, Tal
    Meiyappan, Kailash
    INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 23 - 36