The CP-ABE with Full Verifiability Outsourced Decryption and White-Box Traceability

被引:1
作者
Li Cong [1 ]
Yang Xiaoyuan [1 ]
Liu Yazhou [1 ]
Wang Xu'an [1 ]
机构
[1] Chinese Armed Police Force, Key Lab Network & Informat Secur, Xian 710086, Shaanxi, Peoples R China
来源
CLOUD COMPUTING AND SECURITY, PT III | 2018年 / 11065卷
关键词
Attribute-Based Encryption; Full verifiability; Outsourced decryption; Traceability; CPA-security; ATTRIBUTE-BASED ENCRYPTION; EFFICIENT;
D O I
10.1007/978-3-030-00012-7_64
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the CP-ABE scheme, the private key is defined on attributes shared by multiple users. For any private key that can not be traced back to the owner of the original key, the malicious users may sell their decryption privileges to third parties for economic benefit and will not be discoverable. In addition, most of the existing ABE schemes have a linear increase in decryption cost and ciphertext size with the complexity of access structure. These problems severely limit the application of CP-ABE. By defining the traceable table to trace the user who intentionally disclosed the key, the cost of the decryption operation is reduced through the outsourcing operation, in this paper, a CP-ABE scheme was proposed that is traceable and fully verifiability for outsourced decryption. The scheme can simultaneously check the correctness for transformed ciphertext of the authorized user and unauthorized user. And this scheme supports any monotonous access structure, increasing traceability in the existing CP-ABE scheme will not have any impact on its security. This paper is proved to be selective CPA-secure in the standard model.
引用
收藏
页码:707 / 719
页数:13
相关论文
共 16 条
  • [1] [Anonymous], 2017, ASIAN J CONTROL
  • [2] Boneh D, 2005, LECT NOTES COMPUT SC, V3376, P87
  • [3] Short signatures without random oracles and the SDH assumption in bilinear groups
    Boneh, Dan
    Boyen, Xavier
    [J]. JOURNAL OF CRYPTOLOGY, 2008, 21 (02) : 149 - 177
  • [4] Goyal V., 2006, P 2006 INT C PRIVACY, P1
  • [5] Green M., 2011, P 20 USENIX C SEC, P34
  • [6] Ibraimi L, 2009, LECT NOTES COMPUT SC, V5451, P1, DOI 10.1007/978-3-642-00843-6_1
  • [7] Jun Zhou, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P2398, DOI 10.1109/INFOCOM.2015.7218628
  • [8] Attribute-Based Encryption With Verifiable Outsourced Decryption
    Lai, Junzuo
    Deng, Robert H.
    Guan, Chaowen
    Weng, Jian
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (08) : 1343 - 1354
  • [9] Li J., 2011, P 6 ACM S INF COMP C, P386
  • [10] White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures
    Liu, Zhen
    Cao, Zhenfu
    Wong, Duncan S.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (01) : 76 - 88