Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability

被引:52
|
作者
Zhang, Kai [1 ]
Li, Hui [2 ]
Ma, Jianfeng [3 ]
Liu, Ximeng [4 ]
机构
[1] Xidian Univ, Sch Telecommun Engn, Xian 710071, Shaanxi, Peoples R China
[2] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[3] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Shaanxi, Peoples R China
[4] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
attribute-based encryption; multi-authority; ciphertext-policy; traceability; large universe;
D O I
10.1007/s11432-016-9019-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traceable multi-authority ciphertext-policy attribute-based encryption (CP-ABE) is a practical encryption method that can achieve user traceability and fine-grained access control simultaneously. However, existing traceable multi-authority CP-ABE schemes have two main limitations that prevent them from practical applications. First, these schemes only support small universe: the attributes must be fixed at system setup and the attribute space is restricted to polynomial size. Second, the schemes are either less expressive (the access policy is limited to "AND gates with wildcard") or inefficient (the system is constructed in composite order bilinear groups). To address these limitations, we present a traceable large universe multi-authority CP-ABE scheme, and further prove that it is statically secure in the random oracle model. Compared with existing traceable multi-authority CP-ABE schemes, the proposed scheme has four advantages. First, the attributes are not fixed at setup and the attribute universe is not bounded to polynomial size. Second, the ciphertext polices can be expressed as any monotone access structures. Third, the proposed scheme is constructed in prime order groups, which makes this scheme more efficient than those in composite order bilinear groups. Finally, the proposed scheme requires neither a central authority nor an identity table for tracing.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability
    Kai ZHANG
    Hui LI
    Jianfeng MA
    Ximeng LIU
    ScienceChina(InformationSciences), 2018, 61 (03) : 16 - 28
  • [2] Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability
    Kai Zhang
    Hui Li
    Jianfeng Ma
    Ximeng Liu
    Science China Information Sciences, 2018, 61
  • [3] Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
    Ning, Jianting
    Cao, Zhenfu
    Dong, Xiaolei
    Wei, Lifei
    Lin, Xiaodong
    COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 55 - 72
  • [4] Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud
    Ning, Jianting
    Dong, Xiaolei
    Cao, Zhenfu
    Wei, Lifei
    COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 : 270 - 289
  • [5] ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, 2009, 46 (04) : 803 - 819
  • [6] Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
    Rouselakis, Yannis
    Waters, Brent
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8975 : 315 - 332
  • [7] Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption
    Li, Qi
    Ma, Jianfeng
    Li, Rui
    Xiong, Jinbo
    Liu, Ximeng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4098 - 4109
  • [8] White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes
    Ning, Jianting
    Dong, Xiaolei
    Cao, Zhenfu
    Wei, Lifei
    Lin, Xiaodong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (06) : 1274 - 1288
  • [9] White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures
    Liu, Zhen
    Cao, Zhenfu
    Wong, Duncan S.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (01) : 76 - 88
  • [10] Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles
    Liu, Zhen
    Cao, Zhenfu
    Huang, Qiong
    Wong, Duncan S.
    Yuen, Tsz Hon
    COMPUTER SECURITY - ESORICS 2011, 2011, 6879 : 278 - +