Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild

被引:51
|
作者
Liu, Zhen [1 ]
Cao, Zhenfu [2 ]
Wong, Duncan S. [1 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[2] E China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
基金
中国国家自然科学基金; 高等学校博士学科点专项科研基金;
关键词
Traceability; CP-ABE; blackbox; key-like; policy-specific; ATTRIBUTE-BASED ENCRYPTION; CIPHERTEXTS;
D O I
10.1109/TIFS.2014.2363562
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In Ciphertext-policy attribute-based encryption (CP-ABE), ciphertexts are associated with access policies, which do not have to contain the identities of eligible receivers, and attributes are shared by multiple users. CP-ABE is useful for providing fine-grained access control on encrypted data. However, it also has a practicality concern that a malicious user, with his attributes shared with other users, might leak his decryption privilege as a decryption blackbox, for some financial gain or other incentives, as there is little risk of getting caught. There are two types of decryption blackboxes that reflect different practical scenarios. A key-like decryption blackbox is associated with an attribute set S-D and can decrypt ciphertexts with access policies satisfied by S-D. A policy-specific decryption blackbox is associated with an access policy A(D) and can decrypt ciphertexts with A(D). Policy-specific decryption blackbox has weaker decryption capacity than key-like decryption blackbox, but tracing it is deemed to be more difficult. In the preliminary version (in CCS 2013) of this paper, we proposed a new CP-ABE scheme which is adaptively traceable against key-like decryption blackbox. The scheme has sublinear overhead, which is the most efficient one to date supporting fully collusion-resistant blackbox traceability. The scheme is fully secure in the standard model, and supports any monotonic access structures. In this paper, we further show that the scheme is also selectively traceable against policy-specific decryption blackbox. Furthermore, and more importantly, we prove a general statement that if a CP-ABE scheme is (selectively) traceable against policy-specific decryption blackbox, it is also (selectively) traceable against key-like decryption blackbox, which implies that we now only need to focus on building CP-ABE schemes which are traceable against policy-specific decryption blackbox.
引用
收藏
页码:55 / 68
页数:14
相关论文
共 50 条
  • [1] Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently
    Ning, Jianting
    Cao, Zhenfu
    Dong, Xiaolei
    Gong, Junqing
    Chen, Jie
    COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 551 - 569
  • [2] Verifying Outsourced Decryption of CP-ABE with Signature
    Liu, Hongwei
    Wang, Xueyuan
    Zhang, Peng
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 2010 - 2016
  • [3] Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation
    Sethi, Kamalakanta
    Pradhan, Ankit
    Bera, Padmalochan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51
  • [4] Traceable and revocable CP-ABE with shorter ciphertexts
    Ning, Jianting
    Cao, Zhenfu
    Dong, Xiaolei
    Wei, Lifei
    SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (11)
  • [5] Traceable and revocable CP-ABE with shorter ciphertexts
    Jianting NING
    Zhenfu CAO
    Xiaolei DONG
    Lifei WEI
    Science China(Information Sciences), 2016, 59 (11) : 230 - 232
  • [6] A BGN Type Outsourcing the Decryption of CP-ABE Ciphertexts
    Li Zhenlin
    Zhang Wei
    Ding Yitao
    Bai Ping
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 54 - 63
  • [7] CP-ABE Scheme with Fast Decryption for Public Cloud
    Zou L.-P.
    Feng C.-S.
    Qin Z.-G.
    Yuan D.
    Luo W.-P.
    Li M.
    Ruan Jian Xue Bao/Journal of Software, 2020, 31 (06): : 1817 - 1828
  • [8] Revocable Outsourced Decryption of CP-ABE Based on OBDD
    Chen, Li
    Guo, Rui
    Xu, Lei
    Wei, Xin
    Yang, Geng
    Zhuang, Chaoyuan
    Zhao, Qianqian
    International Journal of Network Security, 2022, 24 (06): : 1094 - 1105
  • [9] A traceable and verifiable CP-ABE scheme with blockchain in VANET
    Haijun Huang
    Hong Zhang
    Zidi Zhao
    Shouhua Zhang
    The Journal of Supercomputing, 2023, 79 : 16859 - 16883
  • [10] CP-ABE with outsourced decryption and directionally hidden policy
    Wang, Zhiwei
    Liu, Wenyang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) : 2387 - 2396