PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption

被引:0
|
作者
Han, Jinguang [1 ]
Susilo, Willy [2 ]
Mu, Yi [2 ]
Zhou, Jianying [3 ]
Au, Man Ho [2 ]
机构
[1] Nanjing Univ Finance & Econ, Jiangsu Prov Key Lab E Business, Nanjing 210003, Jiangsu, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
[3] Inst Infocomm Res, Infocomm Secur Dept, Singapore 138632, Singapore
来源
COMPUTER SECURITY - ESORICS 2014, PT II | 2014年 / 8713卷
基金
中国国家自然科学基金;
关键词
CP-ABE; decentralization; privacy; IDENTITY-BASED ENCRYPTION; MULTI-AUTHORITY; EFFICIENT; BLIND;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cipher-policy attribute-based encryption (CP-ABE) is a more efficient and flexible encryption system as the encryptor can control the access structure when encrypting a message. In this paper, we propose a privacy-preserving decentralized CP-ABE (PPDCP-ABE) scheme where the central authority is not required, namely each authority can work independently without the cooperation to initialize the system. Meanwhile, a user can obtain secret keys from multiple authorities without releasing his global identifier (GID) and attributes to them. This is contrasted to the previous privacy-preserving multi-authority ABE (PPMA-ABE) schemes where a user can obtain secret keys from multiple authorities with them knowing his attributes and a central authority is required. However, some sensitive attributes can also release the user's identity information. Hence, contemporary PPMA-ABE schemes cannot fully protect users' privacy as multiple authorities can cooperate to identifier a user by collecting and analyzing his attributes. Therefore, it remains a challenging and important work to construct a PPMA-ABE scheme where the central authority is not required and both the identifiers and the attributes are considered.
引用
收藏
页码:73 / 90
页数:18
相关论文
共 50 条
  • [31] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
    Emura, Keita
    Miyaji, Atsuko
    Nomura, Akito
    Omote, Kazumasa
    Soshi, Masakazu
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 13 - +
  • [32] Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning With Errors over Rings
    Rahman, Mohammad Shahriar
    Basu, Anirban
    Kiyomoto, Shinsaku
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1759 - 1764
  • [33] GO-CP-ABE: group-oriented ciphertext-policy attribute-based encryption
    Li, Yang
    Tao, Xiaoling
    Wu, Wei
    Liu, Joseph K.
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2018, 10 (01) : 62 - 70
  • [34] A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation
    Li, Jiguo
    Hu, Shengzhou
    Zhang, Yichen
    Han, Jinguang
    SOFT COMPUTING, 2020, 24 (03) : 1869 - 1882
  • [35] A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation
    Jiguo Li
    Shengzhou Hu
    Yichen Zhang
    Jinguang Han
    Soft Computing, 2020, 24 : 1869 - 1882
  • [36] Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
    Li, Jiguo
    Wang, Haiping
    Zhang, Yichen
    Shen, Jian
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 3339 - 3352
  • [37] An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption
    Balu, A.
    Kuppusamy, K.
    INFORMATION SCIENCES, 2014, 276 : 354 - 362
  • [38] Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application
    Ibraimi, Luan
    Petkovic, Milan
    Nikova, Svetla
    Hartel, Pieter
    Jonker, Willem
    INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 309 - +
  • [39] Distributed Ciphertext-Policy Attribute-Based Encryption With Enhanced Collusion Resilience and Privacy Preservation
    Zhang, Leyou
    Gao, Xuehuang
    Kang, Li
    Liang, Pengfei
    Mu, Yi
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 735 - 746
  • [40] Ciphertext-Policy Attribute-Based Encryption with Hiding Access Structure
    Yadav, Umesh Chandra
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 23 - 27