Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles

被引:0
|
作者
Liu, Zhen [1 ,2 ]
Cao, Zhenfu [1 ]
Huang, Qiong [3 ]
Wong, Duncan S. [2 ]
Yuen, Tsz Hon [2 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai 200030, Peoples R China
[2] City Univ Hong Kong, Hong Kong, Hong Kong, Peoples R China
[3] South China Agr Univ, Guangzhou, Guangdong, Peoples R China
来源
COMPUTER SECURITY - ESORICS 2011 | 2011年 / 6879卷
关键词
Attribute based encryption; ciphertext-policy; multi-authority;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently Lewko and Waters proposed the first fully secure multi-authority ciphertext-policy attribute-based encryption (CP-ABE) system in the random oracle model, and leave the construction of a fully secure multi-authority CP-ABE in the standard model as an open problem. Also, there is no CP-ABE system which can completely prevent individual authorities from decrypting ciphertexts. In this paper, we propose a new multi-authority CP-ABE system which addresses these two problems positively. In this new system, there are multiple Central Authorities (CAs) and Attribute Authorities (AAs), the CAs issue identity-related keys to users and are not involved in any attribute related operations, AAs issue attribute-related keys to users and each AA manages a different domain of attributes. The AAs operate independently from each other and do not need to know the existence of other AAs. Messages can be encrypted under any monotone access structure over the entire attribute universe. The system is adaptively secure in the standard model with adaptive authority corruption, and can support large attribute universe.
引用
收藏
页码:278 / +
页数:5
相关论文
共 50 条
  • [31] Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption
    Rao, Y. Sreenivasa
    Dutta, Ratna
    COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2013, 2013, 8099 : 66 - 81
  • [32] Novel Constructions for Ciphertext-Policy Attribute-Based Searchable Encryption
    Brigitthe Hinojosa-Cabello, Melissa
    Morales-Sandoval, Miguel
    Marin-Castro, Heidy M.
    2022 IEEE MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE (ENC), 2022,
  • [33] Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption
    Doshi, Nishant
    Jinwala, Devesh C.
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1988 - 2002
  • [34] Efficient ciphertext-policy attribute-based encryption with blackbox traceability
    Xu, Shengmin
    Yuan, Jiaming
    Xu, Guowen
    Li, Yingjiu
    Liu, Ximeng
    Zhang, Yinghui
    Ying, Zuobin
    INFORMATION SCIENCES, 2020, 538 : 19 - 38
  • [35] An Efficient Ciphertext-policy Attribute-based Encryption on Ideal Lattices
    Zhao Jian
    Gao Haiying
    Hu Bin
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (07) : 1652 - 1660
  • [36] Outsourced ciphertext-policy attribute-based encryption with partial policy hidden
    Yu, Jinxia
    He, Guanghui
    Yan, Xixi
    Tang, Yongli
    Qin, Rongxia
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (05)
  • [37] Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
    Shijie Deng
    Gaobo Yang
    Wen Dong
    Ming Xia
    Multimedia Tools and Applications, 2023, 82 : 22251 - 22274
  • [38] Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
    Deng, Shijie
    Yang, Gaobo
    Dong, Wen
    Xia, Ming
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (14) : 22251 - 22274
  • [39] Adaptively secure multi-authority attribute-based broadcast encryption in fog computing
    Chen, Jie
    Niu, Jiaxu
    Lei, Hao
    Lin, Li
    Ling, Yunhao
    COMPUTER NETWORKS, 2023, 232
  • [40] Improving Privacy and Security in Multi-Authority Attribute-Based Encryption
    Chase, Melissa
    Chow, Sherman S. M.
    CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 121 - 130