Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption

被引:129
作者
Han, Jinguang [1 ]
Susilo, Willy [2 ]
Mu, Yi [2 ]
Zhou, Jianying [3 ]
Au, Man Ho Allen [4 ]
机构
[1] Nanjing Univ Finance & Econ, Jiangsu Prov Key Lab E Business, Nanjing 210003, Jiangsu, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
[3] Inst Infocomm Res, Dept Infocomm Secur, Singapore 138632, Singapore
[4] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
CP-ABE; decentralization; privacy; IDENTITY-BASED ENCRYPTION; MULTI-AUTHORITY; EFFICIENT; BLIND;
D O I
10.1109/TIFS.2014.2382297
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In previous privacy-preserving multiauthority attribute-based encryption (PPMA-ABE) schemes, a user can acquire secret keys from multiple authorities with them knowing his/her attributes and furthermore, a central authority is required. Notably, a user's identity information can be extracted from his/her some sensitive attributes. Hence, existing PPMA-ABE schemes cannot fully protect users' privacy as multiple authorities can collaborate to identify a user by collecting and analyzing his attributes. Moreover, ciphertext-policy ABE (CP-ABE) is a more efficient public-key encryption, where the encryptor can select flexible access structures to encrypt messages. Therefore, a challenging and important work is to construct a PPMA-ABE scheme where there is no necessity of having the central authority and furthermore, both the identifiers and the attributes can be protected to be known by the authorities. In this paper, a privacy-preserving decentralized CP-ABE (PPDCP-ABE) is proposed to reduce the trust on the central authority and protect users' privacy. In our PPDCP-ABE scheme, each authority can work independently without any collaboration to initial the system and issue secret keys to users. Furthermore, a user can obtain secret keys from multiple authorities without them knowing anything about his global identifier and attributes.
引用
收藏
页码:665 / 678
页数:14
相关论文
共 31 条
[1]  
Beime A., 1996, THESIS TECHNION ISRA
[2]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[3]  
Bichsel P, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P600
[4]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
[5]  
Camenisch J, 2001, LECT NOTES COMPUT SC, V2045, P93
[6]  
Camenisch J, 1997, LECT NOTES COMPUT SC, V1294, P410
[7]  
Camenisch J, 2009, LECT NOTES COMPUT SC, V5443, P196
[8]  
Camenisch J, 2008, LECT NOTES COMPUT SC, V5350, P234, DOI 10.1007/978-3-540-89255-7_15
[9]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[10]  
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121