PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption

被引:0
|
作者
Han, Jinguang [1 ]
Susilo, Willy [2 ]
Mu, Yi [2 ]
Zhou, Jianying [3 ]
Au, Man Ho [2 ]
机构
[1] Nanjing Univ Finance & Econ, Jiangsu Prov Key Lab E Business, Nanjing 210003, Jiangsu, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
[3] Inst Infocomm Res, Infocomm Secur Dept, Singapore 138632, Singapore
来源
COMPUTER SECURITY - ESORICS 2014, PT II | 2014年 / 8713卷
基金
中国国家自然科学基金;
关键词
CP-ABE; decentralization; privacy; IDENTITY-BASED ENCRYPTION; MULTI-AUTHORITY; EFFICIENT; BLIND;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cipher-policy attribute-based encryption (CP-ABE) is a more efficient and flexible encryption system as the encryptor can control the access structure when encrypting a message. In this paper, we propose a privacy-preserving decentralized CP-ABE (PPDCP-ABE) scheme where the central authority is not required, namely each authority can work independently without the cooperation to initialize the system. Meanwhile, a user can obtain secret keys from multiple authorities without releasing his global identifier (GID) and attributes to them. This is contrasted to the previous privacy-preserving multi-authority ABE (PPMA-ABE) schemes where a user can obtain secret keys from multiple authorities with them knowing his attributes and a central authority is required. However, some sensitive attributes can also release the user's identity information. Hence, contemporary PPMA-ABE schemes cannot fully protect users' privacy as multiple authorities can cooperate to identifier a user by collecting and analyzing his attributes. Therefore, it remains a challenging and important work to construct a PPMA-ABE scheme where the central authority is not required and both the identifiers and the attributes are considered.
引用
收藏
页码:73 / 90
页数:18
相关论文
共 50 条
  • [21] Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Schemes with Fast Decryption
    Rao, Y. Sreenivasa
    INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 521 - 531
  • [22] Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme
    Ge, Aijun
    Zhang, Jiang
    Zhang, Rui
    Ma, Chuangui
    Zhang, Zhenfeng
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (11) : 2319 - 2321
  • [23] Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
    Deng, Shijie
    Yang, Gaobo
    Dong, Wen
    Xia, Ming
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (14) : 22251 - 22274
  • [24] An Efficient Privacy-Preserving Attribute-Based Encryption with Hidden Policy for Cloud Storage
    Huang, Chanying
    Wei, Songjie
    Fu, Anmin
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2019, 28 (11)
  • [25] Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment
    Nayudu P.P.
    Sekhar K.R.
    Computer Systems Science and Engineering, 2023, 46 (01): : 1079 - 1092
  • [26] Improving the Leakage Rate of Ciphertext-Policy Attribute-Based Encryption for Cloud Computing
    Zhang, Leyou
    Gao, Xiaoxu
    Guo, Fuchun
    Hu, Gongcheng
    IEEE ACCESS, 2020, 8 : 94033 - 94042
  • [27] Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in Cloud Computing
    Wang, Qiang
    Peng, Li
    Xiong, Hu
    Sun, Jianfei
    Qin, Zhiguang
    IEEE ACCESS, 2018, 6 : 760 - 771
  • [28] Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage
    Li, Jiguo
    Shi, Yuerong
    Zhang, Yichen
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)
  • [29] Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating
    Ying, Zuobin
    Li, Hui
    Ma, Jianfeng
    Zhang, Junwei
    Cui, Jiangtao
    SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (04)
  • [30] Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes
    Ibraimi, Luan
    Tang, Qiang
    Hartel, Pieter
    Jonker, Willem
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 1 - 12