Black-Box and Public Traceability in Multi-authority Attribute Based Encryption

被引:7
作者
Zhao, Qianqian [1 ]
Wu, Gaofei [1 ]
Ma, Hua [2 ]
Zhang, Yuqing [1 ,3 ]
Wang, He [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Xidian Univ, Sch Math & Stat, Xian 710071, Peoples R China
[3] Univ Chinese Acad Sci, Natl Comp Network Intrus Protect Ctr, Beijing 101408, Peoples R China
基金
中国国家自然科学基金;
关键词
CP-ABE; Multi-authority; User accountability;
D O I
10.1049/cje.2019.10.006
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Ciphertext-policy Attribute-based encryption (CP-ABE) is a promising tool for implementing finegrained cryptographic access control. While the uniqueness of generating private keys brings extra security issues. The key escrow is inherent in CP-ABE systems because the trusted authority has the power to decrypt every ciphertext. The private keys are only associated with the attributes nor the user's identity. Some malicious users might be tempted to leak their decryption privileges for financial gain without the risk of being caught as the decryption privilege could be shared by multiple users who own the same set of attributes. We propose a new multiauthority CP-ABE with blackbox and public traceability, where the private keys are assigned by the cooperation between one central authority and multi-authorities. The performance and security analyses indicate that the proposed scheme is highly efficient and provably secure under the security model.
引用
收藏
页码:106 / 113
页数:8
相关论文
共 22 条
  • [1] [Anonymous], 1996, SECURE SCHEMES SECRE
  • [2] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [3] Collusion-secure fingerprinting for digital data
    Boneh, D
    Shaw, J
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) : 1897 - 1905
  • [4] Multi-authority attribute-based encryption with honest-but-curious central authority
    Bozovic, Vladimir
    Socek, Daniel
    Steinwandt, Rainer
    Villanyi, Viktoria I.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2012, 89 (03) : 268 - 283
  • [5] Brown L, 2011, COLLOQUY, P34
  • [6] Chabanne H, 2005, LECT NOTES COMPUT SC, V3494, P542
  • [7] Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
  • [8] Chen B, 2015, RESOURCES, ENVIRONMENT AND ENGINEERING, P347
  • [9] Deng H, 2014, LECT NOTES COMPUT SC, V8712, P362, DOI 10.1007/978-3-319-11203-9_21
  • [10] Hinek M.J., 2008, INT J APPL CRYPTOGRA, V2, P250