A survey on multi-authority and decentralized attribute-based encryption

被引:19
|
作者
Oberko, Prince Silas Kwesi [1 ]
Obeng, Victor-Hillary Kofi Setornyo [1 ]
Xiong, Hu [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Peoples R China
关键词
Attribute-based encryption; Multi-authority attribute-based encryption; Privacy preserving; Survey; Taxonomy; IDENTITY-BASED ENCRYPTION; INDUSTRIAL-INTERNET; IMPROVING PRIVACY; ACCESS-CONTROL; SECURITY; SIGNATURE; SCHEME;
D O I
10.1007/s12652-021-02915-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The introduction of attribute-based encryption (ABE) targets to achieve the implementation of single-to-numerous encryption; however, the sole authority challenge and the issue of distributed management of attributes are bottlenecks to its realization. Multi-authority attribute-based encryption (MA-ABE) where various attribute authorities (which may be independent of each other) control different attribute universe and are involved in the administration of attribute keys for decryption provides the necessary platform to undertake the implementation of fine-grained access regulation over shared data while achieving single-to-numerous encryption. In recent years, research into MA-ABE has seen rapid advancement, and we believe that it is a suitable solution to thwarting the key escrow problem as well as the problem of distributed management of attributes. This paper offers a thorough survey and examines the state-of-the-art of some traditional ABE as well as multi-authority attribute-based encryption schemes over the past decade. Furthermore, the survey gives detailed insights on some essential techniques as well as some classic concretely constructed algorithms. Moreover, we discuss an extension (the different directions) of MA-ABE and its progress since its inception. We also provide design principles of MA-ABE and also show comparisons between existing works on areas as security, performance, and functionality. This paper also discusses several interesting open problems. As far as we can tell, no comparable survey on MA-ABE exists in literature so far.
引用
收藏
页码:515 / 533
页数:19
相关论文
共 50 条
  • [31] Accountable and Revocable Large Universe Decentralized Multi-Authority Attribute-Based Encryption for Cloud-Aided IoT
    Huang, Kaiqing
    IEEE ACCESS, 2021, 9 : 123786 - 123804
  • [32] Multi-authority attribute-based identification scheme
    Tang F.
    Bao J.
    Huang Y.
    Huang D.
    Wang H.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (03): : 220 - 228
  • [33] Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
    Kai ZHANG
    Jianfeng MA
    Jiajia LIU
    Hui LI
    Science China(Information Sciences), 2016, 59 (09) : 256 - 258
  • [34] Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
    Kai Zhang
    Jianfeng Ma
    Jiajia Liu
    Hui Li
    Science China Information Sciences, 2016, 59
  • [35] Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
    Zhang, Kai
    Ma, Jianfeng
    Liu, Jiajia
    Li, Hui
    SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (09)
  • [36] A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing
    Tu, Shanshan
    Waqas, Muhammad
    Huang, Fengming
    Abbas, Ghulam
    Abbas, Ziaul Haq
    COMPUTER NETWORKS, 2021, 195
  • [37] LWE-based multi-authority attribute-based encryption scheme with hidden policies
    Tian, Qiuting
    Han, Dezhi
    Liu, Xingao
    Yu, Xueshan
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 19 (02) : 233 - 241
  • [38] A Novel User Collusion-Resistant Decentralized Multi-Authority Attribute-Based Encryption Scheme Using the Deposit on a Blockchain
    Noh, Siwan
    Kim, Donghyun
    Cai, Zhipeng
    Rhee, Kyung-Hyune
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [39] Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing
    Yang, Yan
    Chen, Xingyuan
    Chen, Hao
    Du, Xuehui
    IEEE ACCESS, 2018, 6 : 18009 - 18021
  • [40] Privacy-Preserving Online/Offline and Outsourced Multi-Authority Attribute-Based Encryption
    Shao, Jiaye
    Zhu, Yanqin
    Ji, Qijin
    2017 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS 2017), 2017, : 285 - 291