Making Any Attribute-Based Encryption Accountable, Efficiently

被引:20
作者
Lai, Junzuo [1 ,2 ]
Tang, Qiang [3 ]
机构
[1] Jinan Univ, Guangzhou, Guangdong, Peoples R China
[2] State Key Lab Cryptol, Beijing, Peoples R China
[3] New Jersey Inst Technol, Newark, NJ 07102 USA
来源
COMPUTER SECURITY (ESORICS 2018), PT II | 2018年 / 11099卷
基金
中国国家自然科学基金;
关键词
D O I
10.1007/978-3-319-98989-1_26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) as one of the most interesting multi-recipient public encryption systems, naturally requires some "tracing mechanisms" to identify misbehaving users to foster accountability when unauthorized key re-distributions are taken place. We give a generic construction of (black-box) traceable ABE which only doubles the ciphertext size of the underlying ABE scheme. When instantiating properly, it yields the first such scheme with constant size ciphertext and expressive access control. Furthermore, we extend our generic construction of traceable ABE to support authority accountability. This property is essential for generating an un-deniable proof for user misbehaviors. Our new generic construction gives the first black-box traceable ABE with authority accountability, and constant size ciphertext. All properties are achieved in standard security models.
引用
收藏
页码:527 / 547
页数:21
相关论文
共 32 条
[1]  
Amiri E, 2009, PROCEEDINGS OF THE TWENTIETH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, P336
[2]  
[Anonymous], 2011, ACITA
[3]  
[Anonymous], STOC 96
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]  
Boneh D., 2010, Proc. 10th Annu. ACM Work-shop Dig. Rights Manag, P3
[6]  
Boneh D, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P501
[7]   Security and composition of multiparty cryptographic protocols [J].
Canetti, R .
JOURNAL OF CRYPTOLOGY, 2000, 13 (01) :143-202
[8]  
Chor B., 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P257
[9]  
Garg S, 2013, LECT NOTES COMPUT SC, V8043, P479, DOI 10.1007/978-3-642-40084-1_27
[10]  
Gorbunov S, 2013, STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, P545