Verifiable and auditable multi-authority attribute-based encryption

被引:0
|
作者
Wang, Xingwang [1 ]
Zeng, Peng [1 ]
Luo, Jiaying [1 ]
机构
[1] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
基金
中国国家自然科学基金;
关键词
Attribute-based encryption; Multi-authority; Verifiability; Auditability; Access control; Zero-knowledge proof; EFFICIENT;
D O I
10.1016/j.csi.2025.103991
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) is crucial for cloud computing security as it enables fine-grained non- interactive access control and allows efficient and secure data sharing without relying on trusted third parties. Multi-authority ABE (MABE) is an improvement to traditional single-authority ABE because the former can remove the key escrow problem existed in the latter and thus is more appropriate for access control of some special applications. Recently, Zhou et al. proposed an auditable MABE (A-MABE) scheme in which the authorities are categorized into a trusted authority and several attribute authorities. For the confirmation and protection of data ownership, we propose verifiable A-MABE (VA-MABE) schemes in this paper. The additional feature of verifiability is achieved by our newly proposed zero-knowledge proof protocol which enables a data sender (i.e. data owner) to prove the ownership of the encrypted data without leaking sensitive information. Our proposed VA-MABE schemes also afford authorities the flexibility to join or exit the system with a minimal cost. Addressing concerns about centralized audit power, we incorporate technologies that decentralize this role, thereby enhancing the system's resilience.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] Improving File Hierarchy Attribute-Based Encryption Scheme with Multi-authority in Cloud
    Kang, Li
    Zhang, Leyou
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 3 - 18
  • [32] Multi-authority attribute-based identification scheme
    Tang F.
    Bao J.
    Huang Y.
    Huang D.
    Wang H.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (03): : 220 - 228
  • [33] A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing
    Tu, Shanshan
    Waqas, Muhammad
    Huang, Fengming
    Abbas, Ghulam
    Abbas, Ziaul Haq
    COMPUTER NETWORKS, 2021, 195
  • [34] LWE-based multi-authority attribute-based encryption scheme with hidden policies
    Tian, Qiuting
    Han, Dezhi
    Liu, Xingao
    Yu, Xueshan
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 19 (02) : 233 - 241
  • [35] A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation
    Jiguo Li
    Shengzhou Hu
    Yichen Zhang
    Jinguang Han
    Soft Computing, 2020, 24 : 1869 - 1882
  • [36] A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation
    Li, Jiguo
    Hu, Shengzhou
    Zhang, Yichen
    Han, Jinguang
    SOFT COMPUTING, 2020, 24 (03) : 1869 - 1882
  • [37] Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing
    Yang, Yan
    Chen, Xingyuan
    Chen, Hao
    Du, Xuehui
    IEEE ACCESS, 2018, 6 : 18009 - 18021
  • [38] Privacy-Preserving Online/Offline and Outsourced Multi-Authority Attribute-Based Encryption
    Shao, Jiaye
    Zhu, Yanqin
    Ji, Qijin
    2017 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS 2017), 2017, : 285 - 291
  • [39] Multi-authority attribute-based encryption resilient against auxiliary-input leakage
    School of Computer Science and Technology, Nantong University, Nantong , Jiangsu
    226019, China
    不详
    226019, China
    J. Comput., 2020, 1 (134-147): : 134 - 147
  • [40] A revocable multi-authority attribute-based encryption scheme for fog-enabled IoT
    Penuelas-Angulo, Alejandro
    Feregrino-Uribe, Claudia
    Morales-Sandoval, Miguel
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 155