Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large UniverseaEuro

被引:43
作者
Liu, Zhen [1 ]
Wong, Duncan S. [1 ]
机构
[1] ASTRI, Secur & Data Sci, Hong Kong, Hong Kong, Peoples R China
关键词
attribute-based encryption; traitor tracing; revocation; large attribute universe;
D O I
10.1093/comjnl/bxv101
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A blackbox traceable Attribute-Based Encryption (ABE) can identify a malicious user called traitor, which created a decryption box with respect to an attribute set (respectively, access policy), out of all the users who share the same attribute set (respectively, access policy). However, none of the existing traceable ABE schemes can also support revocation and large attribute universe, that is, being able to revoke compromised keys, and can take an exponentially large number of attributes. In this paper, we formalize the definitions and security models, and propose constructions of both Ciphertext-Policy ABE and Key-Policy ABE that support (i) public and fully collusion-resistant blackbox traceability, (ii) revocation, (iii) large universe and (iv) any monotonic access structures as policies (i.e. high expressivity). We also show that the schemes are secure and blackbox traceable in the standard model against selective adversaries.
引用
收藏
页码:983 / 1004
页数:22
相关论文
共 34 条
[1]  
[Anonymous], 1996, SECURE SCHEMES SECRE
[2]  
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5671, P248, DOI 10.1007/978-3-642-03298-1_16
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]   Hierarchical identity based encryption with constant size ciphertext [J].
Boneh, D ;
Boyen, X ;
Goh, EJ .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :440-456
[5]  
Boneh D., 2006, P ACM C COMPUTER COM, P211
[6]  
Boneh D., 1999, ADV CRYPTOLOGY CRYPT, V1666, P338, DOI [DOI 10.1007/3-540-48405-1, DOI 10.1007/3-540-48405-122]
[7]  
Boneh D, 2006, LECT NOTES COMPUT SC, V4004, P573
[8]  
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[9]  
Deng H, 2014, LECT NOTES COMPUT SC, V8712, P362, DOI 10.1007/978-3-319-11203-9_21
[10]   Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes [J].
Garg, Sanjam ;
Kumarasubramanian, Abishek ;
Sahai, Amit ;
Waters, Brent .
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, :121-130