Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption

被引:16
作者
Zhang, Leyou [1 ]
Liang, Pengfei [1 ]
Mu, Yi [2 ]
机构
[1] Xidian Univ, Sch Math & Stat, Xian 710126, Shaanxi, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
关键词
Decentralized attribute-based encryption; key policy; collusion attack; DBDH assumption; IDENTITY-BASED ENCRYPTION;
D O I
10.1109/ACCESS.2018.2810810
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Decentralized attribute-based encryption (ABE) is an efficient and flexible multi-authority attribute-based encryption system, since it does not requires the central authority and does not need to cooperate among the authorities for creating public parameters. Unfortunately, recent works show that the reality of the privacy preserving and security in almost well-known decentralized key policy ABE (KP-ABE) schemes are doubtful. How to construct a decentralized KP-ABE with the privacy-preserving and user collusion avoidance is still a challenging problem. Most recently, Y.Rahulamathavam et al. proposed a decentralized KP ABE scheme to try avoiding user collusion and preserving the users privacy. However, we exploit the vulnerability of their scheme in this paper at first and present a collusion attack on their decentralized KP-ABE scheme. The attack shows the user collusion cannot be avoided. Subsequently, a new privacy-preserving decentralized KP-ABE is proposed. The proposed scheme avoids the linear attacks at present and achieves the user collusion avoidance. We also show that the security of the proposed scheme is reduced to decisional bilinear Diffie-Hellman assumption. Finally, numerical experiments demonstrate the efficiency and validity of the proposed scheme.
引用
收藏
页码:12736 / 12745
页数:10
相关论文
共 17 条
[1]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[2]  
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[3]  
Camenisch J, 1997, LECT NOTES COMPUT SC, V1294, P410
[4]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[5]  
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
[6]   Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme [J].
Ge, Aijun ;
Zhang, Jiang ;
Zhang, Rui ;
Ma, Chuangui ;
Zhang, Zhenfeng .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (11) :2319-2321
[7]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[8]   Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption [J].
Han, Jinguang ;
Susilo, Willy ;
Mu, Yi ;
Yan, Jun .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (11) :2150-2162
[9]   Decentralizing Attribute-Based Encryption [J].
Lewko, Allison ;
Waters, Brent .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 :568-588
[10]   KERBEROS - AN AUTHENTICATION SERVICE FOR COMPUTER-NETWORKS [J].
NEUMAN, BC ;
TSO, T .
IEEE COMMUNICATIONS MAGAZINE, 1994, 32 (09) :33-38