Black-Box and Public Traceability in Multi-authority Attribute Based Encryption

被引:0
作者
ZHAO Qianqian [1 ]
WU Gaofei [1 ]
MA Hua [2 ]
ZHANG Yuqing [3 ,1 ]
WANG He [1 ]
机构
[1] School of Cyber Engineering, Xidian University
[2] School of Mathematics and Statistics, Xidian University
[3] National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences
基金
中国国家自然科学基金;
关键词
CP-ABE; Multi-authority; User accountability;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
Ciphertext-policy Attribute-based encryption(CP-ABE) is a promising tool for implementing finegrained cryptographic access control. While the uniqueness of generating private keys brings extra security issues.The key escrow is inherent in CP-ABE systems because the trusted authority has the power to decrypt every ciphertext. The private keys are only associated with the attributes nor the user’s identity. Some malicious users might be tempted to leak their decryption privileges for financial gain without the risk of being caught as the decryption privilege could be shared by multiple users who own the same set of attributes. We propose a new multiauthority CP-ABE with blackbox and public traceability,where the private keys are assigned by the cooperation between one central authority and multi-authorities. The performance and security analyses indicate that the proposed scheme is highly efficient and provably secure under the security model.
引用
收藏
页码:106 / 113
页数:8
相关论文
共 6 条
  • [1] Ciphertext-Policy Attribute Based Encryption Supporting Any Monotone Access Structures Without Escrow[J]. ZHAO Qianqian,ZHANG Yuqing,ZHANG Guanghua,WANG He.Chinese Journal of Electronics. 2017(03)
  • [2] Ciphertext-Policy Attribute-Based Encryption with Short Keys[J]. XU Peng,TANG Yong,JIANG Wenbin,JIN Hai,ZOU Deqing.Chinese Journal of Electronics. 2014(04)
  • [3] Attribute-based encryption without key cloning[J] . M. Jason Hinek,Shaoquan,Jiang,Reihaneh,Safavi-Naini,Siamak,F.,Shahandashti.Int. J. of Applied Cryptography . 2012 (3)
  • [4] Multi-authority attribute-based encryption with honest-but-curious central authority
    Bozovic, Vladimir
    Socek, Daniel
    Steinwandt, Rainer
    Villanyi, Viktoria I.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2012, 89 (03) : 268 - 283
  • [5] DAC-MACS:Effective data access control for multi-authority cloud storage systems .2 Kan Y,Xiaohua J,Kui R,Bo Z. 2013 Proceedings IEEE INFOCOM . 2013
  • [6] Public Traceability in Traitor Tracing Schemes .2 CHABANNE H,PHAN D H,POINTCHEVAL D. International Conference on the Theory and Applications of Cryptographic Tech-niques . 2005