A survey on multi-authority and decentralized attribute-based encryption

被引:19
|
作者
Oberko, Prince Silas Kwesi [1 ]
Obeng, Victor-Hillary Kofi Setornyo [1 ]
Xiong, Hu [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Peoples R China
关键词
Attribute-based encryption; Multi-authority attribute-based encryption; Privacy preserving; Survey; Taxonomy; IDENTITY-BASED ENCRYPTION; INDUSTRIAL-INTERNET; IMPROVING PRIVACY; ACCESS-CONTROL; SECURITY; SIGNATURE; SCHEME;
D O I
10.1007/s12652-021-02915-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The introduction of attribute-based encryption (ABE) targets to achieve the implementation of single-to-numerous encryption; however, the sole authority challenge and the issue of distributed management of attributes are bottlenecks to its realization. Multi-authority attribute-based encryption (MA-ABE) where various attribute authorities (which may be independent of each other) control different attribute universe and are involved in the administration of attribute keys for decryption provides the necessary platform to undertake the implementation of fine-grained access regulation over shared data while achieving single-to-numerous encryption. In recent years, research into MA-ABE has seen rapid advancement, and we believe that it is a suitable solution to thwarting the key escrow problem as well as the problem of distributed management of attributes. This paper offers a thorough survey and examines the state-of-the-art of some traditional ABE as well as multi-authority attribute-based encryption schemes over the past decade. Furthermore, the survey gives detailed insights on some essential techniques as well as some classic concretely constructed algorithms. Moreover, we discuss an extension (the different directions) of MA-ABE and its progress since its inception. We also provide design principles of MA-ABE and also show comparisons between existing works on areas as security, performance, and functionality. This paper also discusses several interesting open problems. As far as we can tell, no comparable survey on MA-ABE exists in literature so far.
引用
收藏
页码:515 / 533
页数:19
相关论文
共 50 条
  • [21] Multi-authority attribute based encryption
    Chase, Melissa
    Theory of Cryptography, Proceedings, 2007, 4392 : 515 - 534
  • [22] TRACEABLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD COMPUTING
    Yang, Xiaodong
    Yang, Ping
    An, Faying
    Zhou, Qixu
    Yang, Miaomiao
    2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 263 - 267
  • [23] A Multi-authority Attribute-Based Encryption Access Control for Social Network
    Yang, Xiao-dong
    Yang, Miao-miao
    Yang, Ping
    Leng, Qi
    CONFERENCE PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON CONTROL SCIENCE AND SYSTEMS ENGINEERING (ICCSSE), 2017, : 671 - 674
  • [24] Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata
    Pradhan, Ankit
    Sethi, Kamalakanta
    Mohapatra, Shrohan
    Bera, Padmalochan
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 434 - 456
  • [25] Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage
    Nomura, Kenta
    Mohri, Masami
    Shiraishi, Yoshiaki
    Morii, Masakatu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (10) : 2420 - 2431
  • [26] Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption
    Li, Yang
    Qi, Baoyue
    Wang, Mengmeng
    Zhu, Jianming
    Wang, Xiuli
    DATA SCIENCE (ICPCSEE 2022), PT II, 2022, 1629 : 105 - 124
  • [27] Secure and Efficient Multi-Authority Attribute-Based Encryption Scheme From Lattices
    Liu, Yuan
    Wang, Licheng
    Li, Lixiang
    Yan, Xixi
    IEEE ACCESS, 2019, 7 : 3665 - 3674
  • [28] Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Wu, Yulin
    Yiu, S. M.
    2018 IEEE INT CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, UBIQUITOUS COMPUTING & COMMUNICATIONS, BIG DATA & CLOUD COMPUTING, SOCIAL COMPUTING & NETWORKING, SUSTAINABLE COMPUTING & COMMUNICATIONS, 2018, : 1003 - 1008
  • [29] Adaptively secure multi-authority attribute-based broadcast encryption in fog computing
    Chen, Jie
    Niu, Jiaxu
    Lei, Hao
    Lin, Li
    Ling, Yunhao
    COMPUTER NETWORKS, 2023, 232
  • [30] Improving File Hierarchy Attribute-Based Encryption Scheme with Multi-authority in Cloud
    Kang, Li
    Zhang, Leyou
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 3 - 18