ZHAO Qianqian, WU Gaofei, MA Hua, et al., “Black-Box and Public Traceability in Multi-authority Attribute Based Encryption,” Chinese Journal of Electronics, vol. 29, no. 1, pp. 106-113, 2020, doi: 10.1049/cje.2019.10.006
Citation: ZHAO Qianqian, WU Gaofei, MA Hua, et al., “Black-Box and Public Traceability in Multi-authority Attribute Based Encryption,” Chinese Journal of Electronics, vol. 29, no. 1, pp. 106-113, 2020, doi: 10.1049/cje.2019.10.006

Black-Box and Public Traceability in Multi-authority Attribute Based Encryption

doi: 10.1049/cje.2019.10.006
Funds:  This work is supported by the National Key R&D Program China (No.2018YFB0804701) and the National Natural Science Foundation of China (No.61602361, No.U1836210, No.61572460).
More Information
  • Corresponding author: WANG He (corresponding author) received the Ph.D. degree from Xidian University, China, in 2016. She is currently a lecturer in School of Cyber Engineering, Xidian University, China. Her main research interests include cryptography, quantum cryptography and quantum communication protocol. (Email:hewang@xidian.edu.cn)
  • Received Date: 2017-03-20
  • Rev Recd Date: 2017-09-15
  • Publish Date: 2020-01-10
  • Ciphertext-policy Attribute-based encryption (CP-ABE) is a promising tool for implementing finegrained cryptographic access control. While the uniqueness of generating private keys brings extra security issues. The key escrow is inherent in CP-ABE systems because the trusted authority has the power to decrypt every ciphertext. The private keys are only associated with the attributes nor the user's identity. Some malicious users might be tempted to leak their decryption privileges for financial gain without the risk of being caught as the decryption privilege could be shared by multiple users who own the same set of attributes. We propose a new multiauthority CP-ABE with blackbox and public traceability, where the private keys are assigned by the cooperation between one central authority and multi-authorities. The performance and security analyses indicate that the proposed scheme is highly efficient and provably secure under the security model.
  • loading
  • J. Bethencourt, A. Sahai and B. Waters, "Ciphertext-policy attribute-based encryption", Proceeding of IEEE Symposium Security and Privacy, Oakland, California, USA, pp.321-334, 2007.
    P. XU, Y. TANG, W.B. JIANG, et al., "Ciphertext-policy attribute-based encryption with short keys", Chinese Journal of Electronics, Vol.23, No.4, pp.655-660, 2014.
    Q. ZHAO, Y. ZHANG, G. ZHANG, et al., "Ciphertext-policy attribute based encryption supporting any monotone access structures without escrow", Chinese Journal of Electronics, Vol.26, No.3, pp.640-646, 2017.
    M. Chase, "Multi-authority attribute based encryption", Proceedings of Theory of Cryptography, Heidelberg, Berlin, Germany, Vol.4392 of LNCS, Springer, pp.515-534, 2007.
    V. Bozovic, D. Socek, R. Steinwandt, et al., "Multi-authority attribute based encryption with honest-but-curious central authority", International Journal of Computer Mathematics, Vol.89, No.3, pp.268-283, 2012.
    H. Lin, Z.F. Cao, X.H. Liang, et al., "Secure threshold multi-authority attribute based encryption without a central authority", Proceedings of INDOCRYPT, Heidelberg, Berlin, Germany, Vol.5365 of LNCS, pp.426-436, 2008.
    K. Yang, X.H. Jia, K. Ren, et al., "DAC-MACS:Effective data access control for multi-authority cloud storage systems", Proceedings of IEEE INFOCOM, Turin, Italy, pp.2895-2903, 2013.
    M.J. Hinek, S. Jiang, R. Safavi-Naini, et al., "Attributebased encryption with key cloning protection", International Journal of Applied Cryptography, Vol.2, No.3, pp.250-270, 2008.
    J. Li, K. Ren and K. Kim, "A2BE:Accountable attributebased encryption for abuse free access control", IACR Cryptology ePrint Archive, 2009, https://eprint.iacr.org/2009/118, 2018-8-14.
    Z. Liu, Z. Cao and D.S. Wong, "White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures", IEEE Transactions on Information Forensics and Security, Vol.8, No.1, pp.76-88, 2013.
    J.T. Ning, X.L. Dong, Z.F. Cao, et al., "White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes", IEEE Transactions on Information Forensics and Security, Vol.10, No.6, pp.1274-1288, 2015.
    J.T. Ning, X.L. Dong, Z.F. Cao, et al., "Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud", IACR Cryptology ePrint Archive, 2015, https://eprint.iacr.org/2015/613, 2018-8-14.
    J. Li, K. Ren, B. Zhu, et al., "Privacy-aware attributebased encryption with user accountability", International Conference on Information Security, Pisa, Italy, pp.347-362, 2009.
    J. Li, Q. Huang, X. Chen, et al., "Multi-authority ciphertextpolicy attribute-based encryption with accountability", Proceeding of the 6th ACM Symposium on Information, Computer and Communications Security, New York, USA, pp.386-390, 2011.
    D. Boneh and J. Shaw, "Collusion secure finger printing for digital data", IEEE Transactions on Information Theory, Vol.44, No.5, pp.1897-1905, 1998.
    H. Deng, Q. Wu, B. Qin, et al., "Tracing and revoking leaked credentials:Accountability in leaking sensitive outsourced data", Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, New York, USA, pp.425-443, 2014.
    H. Deng, Q. Wu, B. Qin, et al., "Who is touching my cloud", European Symposium on Research in Computer Security of ESORICS, Wroclaw, Poland, pp.362-379, 2014.
    Z. Liu, Z.F. Cao and D.S. Wong, "Expressive blackbox traceable ciphertext-policy attribute-based encryption", IACR Cryptology ePrint Archive, 2012.
    Z. Liu, Z.F. Cao and D.S. Wong, "Blackbox traceable cpabe:how to catch people leaking their keys by selling decryption devices on eBay", Proceedings of ACM Conference on Computer and Communications Security, New York, USA, pp.475-486, 2013.
    A. Beimel, "Secure schemes for secret sharing and key distribution", Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel, 1996.
    M. Green, S. Hohenberger and B. Waters, "Outsourcing the decryption of abe ciphertexts", Proceedings of the 20th USENIX Security Symposium, Berkeley, CA, USA, pp.34-49, 2011.
    H. Chabanne, D.H. Phan and D. Pointcheval, "Public traceability in traitor tracing schemes", Annual International Conference on the Theory and Applications of Cryptographic Techniques, Berlin, Heidelberg, pp.542-558, 2005.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (572) PDF downloads(572) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return