Verifiable and auditable multi-authority attribute-based encryption

被引:0
|
作者
Wang, Xingwang [1 ]
Zeng, Peng [1 ]
Luo, Jiaying [1 ]
机构
[1] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
基金
中国国家自然科学基金;
关键词
Attribute-based encryption; Multi-authority; Verifiability; Auditability; Access control; Zero-knowledge proof; EFFICIENT;
D O I
10.1016/j.csi.2025.103991
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) is crucial for cloud computing security as it enables fine-grained non- interactive access control and allows efficient and secure data sharing without relying on trusted third parties. Multi-authority ABE (MABE) is an improvement to traditional single-authority ABE because the former can remove the key escrow problem existed in the latter and thus is more appropriate for access control of some special applications. Recently, Zhou et al. proposed an auditable MABE (A-MABE) scheme in which the authorities are categorized into a trusted authority and several attribute authorities. For the confirmation and protection of data ownership, we propose verifiable A-MABE (VA-MABE) schemes in this paper. The additional feature of verifiability is achieved by our newly proposed zero-knowledge proof protocol which enables a data sender (i.e. data owner) to prove the ownership of the encrypted data without leaking sensitive information. Our proposed VA-MABE schemes also afford authorities the flexibility to join or exit the system with a minimal cost. Addressing concerns about centralized audit power, we incorporate technologies that decentralize this role, thereby enhancing the system's resilience.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
    Kai ZHANG
    Jianfeng MA
    Jiajia LIU
    Hui LI
    Science China(Information Sciences), 2016, 59 (09) : 256 - 258
  • [2] Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
    Kai Zhang
    Jianfeng Ma
    Jiajia Liu
    Hui Li
    Science China Information Sciences, 2016, 59
  • [3] Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
    Zhang, Kai
    Ma, Jianfeng
    Liu, Jiajia
    Li, Hui
    SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (09)
  • [4] A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy
    Qi, Fang
    Li, Ke
    Tang, Zhe
    2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 607 - 613
  • [5] A survey on multi-authority and decentralized attribute-based encryption
    Prince Silas Kwesi Oberko
    Victor-Hillary Kofi Setornyo Obeng
    Hu Xiong
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 515 - 533
  • [6] Multi-authority attribute-based encryption with efficient revocation
    Zhang K.
    Ma J.-F.
    Li H.
    Zhang J.-W.
    Zhang T.
    Tongxin Xuebao/Journal on Communications, 2017, 38 (03): : 83 - 91
  • [7] A survey on multi-authority and decentralized attribute-based encryption
    Oberko, Prince Silas Kwesi
    Obeng, Victor-Hillary Kofi Setornyo
    Xiong, Hu
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (01) : 515 - 533
  • [8] Dynamic Collusion Functional Encryption and Multi-Authority Attribute-Based Encryption
    Garg, Rachit
    Goyal, Rishab
    Lu, George
    PUBLIC-KEY CRYPTOGRAPHY, PT IV, PKC 2024, 2024, 14604 : 69 - 104
  • [9] Improving Privacy and Security in Multi-Authority Attribute-Based Encryption
    Chase, Melissa
    Chow, Sherman S. M.
    CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 121 - 130
  • [10] SIMPLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION FOR SHORT MESSAGES
    Villanyi, Viktoria I.
    COMPUTING AND INFORMATICS, 2016, 35 (01) : 128 - 142