PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption

被引:0
作者
Han, Jinguang [1 ]
Susilo, Willy [2 ]
Mu, Yi [2 ]
Zhou, Jianying [3 ]
Au, Man Ho [2 ]
机构
[1] Nanjing Univ Finance & Econ, Jiangsu Prov Key Lab E Business, Nanjing 210003, Jiangsu, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
[3] Inst Infocomm Res, Infocomm Secur Dept, Singapore 138632, Singapore
来源
COMPUTER SECURITY - ESORICS 2014, PT II | 2014年 / 8713卷
基金
中国国家自然科学基金;
关键词
CP-ABE; decentralization; privacy; IDENTITY-BASED ENCRYPTION; MULTI-AUTHORITY; EFFICIENT; BLIND;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cipher-policy attribute-based encryption (CP-ABE) is a more efficient and flexible encryption system as the encryptor can control the access structure when encrypting a message. In this paper, we propose a privacy-preserving decentralized CP-ABE (PPDCP-ABE) scheme where the central authority is not required, namely each authority can work independently without the cooperation to initialize the system. Meanwhile, a user can obtain secret keys from multiple authorities without releasing his global identifier (GID) and attributes to them. This is contrasted to the previous privacy-preserving multi-authority ABE (PPMA-ABE) schemes where a user can obtain secret keys from multiple authorities with them knowing his attributes and a central authority is required. However, some sensitive attributes can also release the user's identity information. Hence, contemporary PPMA-ABE schemes cannot fully protect users' privacy as multiple authorities can cooperate to identifier a user by collecting and analyzing his attributes. Therefore, it remains a challenging and important work to construct a PPMA-ABE scheme where the central authority is not required and both the identifiers and the attributes are considered.
引用
收藏
页码:73 / 90
页数:18
相关论文
共 31 条
[1]  
[Anonymous], THESIS
[2]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[3]  
Bichsel P, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P600
[4]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
[5]  
Camenisch J, 2001, LECT NOTES COMPUT SC, V2045, P93
[6]  
Camenisch J, 1997, LECT NOTES COMPUT SC, V1294, P410
[7]  
Camenisch J, 2009, LECT NOTES COMPUT SC, V5443, P196
[8]  
Camenisch J, 2008, LECT NOTES COMPUT SC, V5350, P234, DOI 10.1007/978-3-540-89255-7_15
[9]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[10]  
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121