Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles

被引:0
|
作者
Liu, Zhen [1 ,2 ]
Cao, Zhenfu [1 ]
Huang, Qiong [3 ]
Wong, Duncan S. [2 ]
Yuen, Tsz Hon [2 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai 200030, Peoples R China
[2] City Univ Hong Kong, Hong Kong, Hong Kong, Peoples R China
[3] South China Agr Univ, Guangzhou, Guangdong, Peoples R China
来源
COMPUTER SECURITY - ESORICS 2011 | 2011年 / 6879卷
关键词
Attribute based encryption; ciphertext-policy; multi-authority;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently Lewko and Waters proposed the first fully secure multi-authority ciphertext-policy attribute-based encryption (CP-ABE) system in the random oracle model, and leave the construction of a fully secure multi-authority CP-ABE in the standard model as an open problem. Also, there is no CP-ABE system which can completely prevent individual authorities from decrypting ciphertexts. In this paper, we propose a new multi-authority CP-ABE system which addresses these two problems positively. In this new system, there are multiple Central Authorities (CAs) and Attribute Authorities (AAs), the CAs issue identity-related keys to users and are not involved in any attribute related operations, AAs issue attribute-related keys to users and each AA manages a different domain of attributes. The AAs operate independently from each other and do not need to know the existence of other AAs. Messages can be encrypted under any monotone access structure over the entire attribute universe. The system is adaptively secure in the standard model with adaptive authority corruption, and can support large attribute universe.
引用
收藏
页码:278 / +
页数:5
相关论文
共 50 条
  • [41] New Multi-authority Attribute-based Encryption Scheme on Lattices
    Yan Xixi
    Liu Yuan
    Li Zichen
    Tang Yongli
    Ye Qing
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (04) : 811 - 817
  • [42] A survey on multi-authority and decentralized attribute-based encryption
    Prince Silas Kwesi Oberko
    Victor-Hillary Kofi Setornyo Obeng
    Hu Xiong
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 515 - 533
  • [43] A survey on multi-authority and decentralized attribute-based encryption
    Oberko, Prince Silas Kwesi
    Obeng, Victor-Hillary Kofi Setornyo
    Xiong, Hu
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (01) : 515 - 533
  • [44] Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance
    Jiang, Yinhao
    Susilo, Willy
    Mu, Yi
    Guo, Fuchun
    INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 477 - 494
  • [45] Ciphertext-Policy Attribute-Based Encryption with Non-Monotonic Access Structure
    Jia Hong-Yong
    Chen Yue
    Mao Xiu-Qing
    Dou Rui-Yu
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL IV, 2010, : 484 - 487
  • [46] Expressive ciphertext-policy attribute-based encryption with direct user revocation
    Bai C.
    Zhang Y.
    Ma H.
    Liu Z.
    International Journal of Embedded Systems, 2017, 9 (06) : 495 - 504
  • [47] Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
    Rouselakis, Yannis
    Waters, Brent
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8975 : 315 - 332
  • [48] Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud
    Ning, Jianting
    Dong, Xiaolei
    Cao, Zhenfu
    Wei, Lifei
    COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 : 270 - 289
  • [49] Traceable-then-revocable ciphertext-policy attribute-based encryption scheme
    Liu, Zhenhua
    Duan, Shuhong
    Zhou, Peilin
    Wang, Baocang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 903 - 913
  • [50] A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption
    Malluhi, Qutaibah M.
    Shikfa, Abdullatif
    Viet Cuong Trinh
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 230 - 240