Citation: | ZHAO Qianqian, WU Gaofei, MA Hua, et al., “Black-Box and Public Traceability in Multi-authority Attribute Based Encryption,” Chinese Journal of Electronics, vol. 29, no. 1, pp. 106-113, 2020, doi: 10.1049/cje.2019.10.006 |
J. Bethencourt, A. Sahai and B. Waters, "Ciphertext-policy attribute-based encryption", Proceeding of IEEE Symposium Security and Privacy, Oakland, California, USA, pp.321-334, 2007.
|
P. XU, Y. TANG, W.B. JIANG, et al., "Ciphertext-policy attribute-based encryption with short keys", Chinese Journal of Electronics, Vol.23, No.4, pp.655-660, 2014.
|
Q. ZHAO, Y. ZHANG, G. ZHANG, et al., "Ciphertext-policy attribute based encryption supporting any monotone access structures without escrow", Chinese Journal of Electronics, Vol.26, No.3, pp.640-646, 2017.
|
M. Chase, "Multi-authority attribute based encryption", Proceedings of Theory of Cryptography, Heidelberg, Berlin, Germany, Vol.4392 of LNCS, Springer, pp.515-534, 2007.
|
V. Bozovic, D. Socek, R. Steinwandt, et al., "Multi-authority attribute based encryption with honest-but-curious central authority", International Journal of Computer Mathematics, Vol.89, No.3, pp.268-283, 2012.
|
H. Lin, Z.F. Cao, X.H. Liang, et al., "Secure threshold multi-authority attribute based encryption without a central authority", Proceedings of INDOCRYPT, Heidelberg, Berlin, Germany, Vol.5365 of LNCS, pp.426-436, 2008.
|
K. Yang, X.H. Jia, K. Ren, et al., "DAC-MACS:Effective data access control for multi-authority cloud storage systems", Proceedings of IEEE INFOCOM, Turin, Italy, pp.2895-2903, 2013.
|
M.J. Hinek, S. Jiang, R. Safavi-Naini, et al., "Attributebased encryption with key cloning protection", International Journal of Applied Cryptography, Vol.2, No.3, pp.250-270, 2008.
|
J. Li, K. Ren and K. Kim, "A2BE:Accountable attributebased encryption for abuse free access control", IACR Cryptology ePrint Archive, 2009, https://eprint.iacr.org/2009/118, 2018-8-14.
|
Z. Liu, Z. Cao and D.S. Wong, "White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures", IEEE Transactions on Information Forensics and Security, Vol.8, No.1, pp.76-88, 2013.
|
J.T. Ning, X.L. Dong, Z.F. Cao, et al., "White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes", IEEE Transactions on Information Forensics and Security, Vol.10, No.6, pp.1274-1288, 2015.
|
J.T. Ning, X.L. Dong, Z.F. Cao, et al., "Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud", IACR Cryptology ePrint Archive, 2015, https://eprint.iacr.org/2015/613, 2018-8-14.
|
J. Li, K. Ren, B. Zhu, et al., "Privacy-aware attributebased encryption with user accountability", International Conference on Information Security, Pisa, Italy, pp.347-362, 2009.
|
J. Li, Q. Huang, X. Chen, et al., "Multi-authority ciphertextpolicy attribute-based encryption with accountability", Proceeding of the 6th ACM Symposium on Information, Computer and Communications Security, New York, USA, pp.386-390, 2011.
|
D. Boneh and J. Shaw, "Collusion secure finger printing for digital data", IEEE Transactions on Information Theory, Vol.44, No.5, pp.1897-1905, 1998.
|
H. Deng, Q. Wu, B. Qin, et al., "Tracing and revoking leaked credentials:Accountability in leaking sensitive outsourced data", Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, New York, USA, pp.425-443, 2014.
|
H. Deng, Q. Wu, B. Qin, et al., "Who is touching my cloud", European Symposium on Research in Computer Security of ESORICS, Wroclaw, Poland, pp.362-379, 2014.
|
Z. Liu, Z.F. Cao and D.S. Wong, "Expressive blackbox traceable ciphertext-policy attribute-based encryption", IACR Cryptology ePrint Archive, 2012.
|
Z. Liu, Z.F. Cao and D.S. Wong, "Blackbox traceable cpabe:how to catch people leaking their keys by selling decryption devices on eBay", Proceedings of ACM Conference on Computer and Communications Security, New York, USA, pp.475-486, 2013.
|
A. Beimel, "Secure schemes for secret sharing and key distribution", Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel, 1996.
|
M. Green, S. Hohenberger and B. Waters, "Outsourcing the decryption of abe ciphertexts", Proceedings of the 20th USENIX Security Symposium, Berkeley, CA, USA, pp.34-49, 2011.
|
H. Chabanne, D.H. Phan and D. Pointcheval, "Public traceability in traitor tracing schemes", Annual International Conference on the Theory and Applications of Cryptographic Techniques, Berlin, Heidelberg, pp.542-558, 2005.
|