Verifiable and auditable multi-authority attribute-based encryption

被引:0
|
作者
Wang, Xingwang [1 ]
Zeng, Peng [1 ]
Luo, Jiaying [1 ]
机构
[1] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
基金
中国国家自然科学基金;
关键词
Attribute-based encryption; Multi-authority; Verifiability; Auditability; Access control; Zero-knowledge proof; EFFICIENT;
D O I
10.1016/j.csi.2025.103991
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) is crucial for cloud computing security as it enables fine-grained non- interactive access control and allows efficient and secure data sharing without relying on trusted third parties. Multi-authority ABE (MABE) is an improvement to traditional single-authority ABE because the former can remove the key escrow problem existed in the latter and thus is more appropriate for access control of some special applications. Recently, Zhou et al. proposed an auditable MABE (A-MABE) scheme in which the authorities are categorized into a trusted authority and several attribute authorities. For the confirmation and protection of data ownership, we propose verifiable A-MABE (VA-MABE) schemes in this paper. The additional feature of verifiability is achieved by our newly proposed zero-knowledge proof protocol which enables a data sender (i.e. data owner) to prove the ownership of the encrypted data without leaking sensitive information. Our proposed VA-MABE schemes also afford authorities the flexibility to join or exit the system with a minimal cost. Addressing concerns about centralized audit power, we incorporate technologies that decentralize this role, thereby enhancing the system's resilience.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] Efficient Multi-authority Access Control using Attribute-based Encryption in Cloud Storage
    Challagidad, Praveen S.
    Birje, Mahantesh N.
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 840 - 849
  • [42] A Privacy-Preserving Multi-Authority Attribute-Based Encryption Approach for Mobile Healthcare
    Meng, Dacheng
    Luo, Entao
    Wang, Guojun
    PROCEEDINGS 2016 IEEE 13TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS 2016), 2016, : 299 - 306
  • [43] Free global ID against collusion attack on multi-authority attribute-based encryption
    Gao, Ang
    Li, Zengzhi
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (09) : 1143 - 1152
  • [44] Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption
    Li, Qi
    Ma, Jianfeng
    Li, Rui
    Xiong, Jinbo
    Liu, Ximeng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4098 - 4109
  • [45] Multi-authority Decentralized Attribute-Based Authorization Framework
    Sok, Kimheng
    Colin, Jean Noel
    Po, Kimtho
    ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS (CAISE 2022), 2022, 451 : 18 - 30
  • [46] Multi-authority Attribute Based Encryption Scheme with Revocation
    Huang, XiaoFang
    Tao, Qi
    Qin, BaoDong
    Liu, ZhiQin
    24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015, 2015,
  • [47] Weighted Attribute-Based Proxy Re-Encryption Scheme with Distributed Multi-Authority Attributes
    Yi, Wenlong
    Wang, Chuang
    Kuzmin, Sergey
    Gerasimov, Igor
    Cheng, Xiangping
    SENSORS, 2024, 24 (15)
  • [48] Distributed Multi-authority Attribute-based Encryption Scheme for Friend Discovery in Mobile Social Networks
    Wang, Wenbo
    Qi, Fang
    Wu, Xiaoqiang
    Tang, Zhe
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE 2016 (ICCS 2016), 2016, 80 : 617 - 626
  • [49] Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks
    Luo, Entao
    Liu, Qin
    Wang, Guojun
    IEEE COMMUNICATIONS LETTERS, 2016, 20 (09) : 1772 - 1775
  • [50] Privacy-preserving Multi-authority Attribute-based Encryption with Dynamic Policy Updating in PHR
    Yan, Xixi
    Ni, Hao
    Liu, Yuan
    Han, Dezhi
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2019, 16 (03) : 831 - 847