Key Cooperative Attribute-Based Encryption

被引:0
|
作者
Huang, Luqi [1 ]
Susilo, Willy [1 ]
Yang, Guomin [2 ]
Guo, Fuchun [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW, Australia
[2] Singapore Management Univ, Sch Comp & Informat Syst, Singapore, Singapore
基金
澳大利亚研究理事会;
关键词
Attribute-based encryption; Key management; Key cooperative; Trust delegation; MULTI-AUTHORITY;
D O I
10.1007/978-981-97-5025-2_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) is an important technology in building access control systems with precise control and scalability. In an ABE system, there exists a private key generator (PKG) that issues all private keys. The PKG has a significant drawback referred to as the huge key management burden in large-scale user systems. To overcome this limitation, we propose a more flexible system that offers users the choice to utilize decryption keys either from the PKG or from trusted users to decrypt the ciphertext, reducing the workload of the PKG. Unfortunately, users are restricted to only receiving private keys from the PKG in most ABE schemes. Thus, our system ABE extends the ability of trusted users to generate and distribute decryption keys. Furthermore, decryption keys from trusted users possess equivalent decryption with a private key from the PKG when satisfying the cooperative access policy set by the encryptor. We define the concept of key cooperative ABE for the first time, presenting a key cooperative ABE scheme.
引用
收藏
页码:241 / 260
页数:20
相关论文
共 50 条
  • [1] Attribute-Based Key-Insulated Encryption
    Chen, Jian-Hong
    Wang, Yong-Tao
    Chen, Ke-Fei
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (02) : 437 - 449
  • [2] Defending against key exposure in attribute-based encryption
    Li, J.
    Chen, X.
    Tian, H.
    Gao, C.
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2014, 17 (01) : 31 - 38
  • [3] Accountable authority key policy attribute-based encryption
    WANG YongTao 1
    2 China Information Technology Security Evaluation Center
    3 Shanghai Key Laboratory of Scalable Computing and Systems
    4 State Key Laboratory of Information Security
    [J]. Science China(Information Sciences), 2012, 55 (07) : 1631 - 1638
  • [4] Accountable authority key policy attribute-based encryption
    Wang YongTao
    Chen KeFei
    Long Yu
    Liu ZhaoHui
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (07) : 1631 - 1638
  • [5] A Key-Policy Attribute-Based Broadcast Encryption
    Sun, Jin
    Hu, Yupu
    Zhang, Leyou
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (05) : 444 - 452
  • [6] Accountable authority key policy attribute-based encryption
    YongTao Wang
    KeFei Chen
    Yu Long
    ZhaoHui Liu
    [J]. Science China Information Sciences, 2012, 55 : 1631 - 1638
  • [7] Hierarchical Authority Key-Policy Attribute-Based Encryption
    You, Lin
    Wang, Lijun
    [J]. 2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 868 - 872
  • [8] Attribute-Based and Keywords Vector Searchable Public Key Encryption
    Wang, Huiwen
    Li, Jianqiang
    Yang, Yanli
    Ming, Zhong
    [J]. SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 317 - 326
  • [9] Public Key Timed-Release Attribute-Based Encryption
    Yuan, Ke
    Shen, Nan
    Yan, Yonghang
    Liu, Zheli
    Jia, Chufu
    [J]. APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 65 - 73
  • [10] Attribute-Based Encryption for Circuits
    Gorbunov, Sergey
    Vaikuntanathan, Vinod
    Wee, Hoeteck
    [J]. STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2013, : 545 - 554