Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild

被引:51
|
作者
Liu, Zhen [1 ]
Cao, Zhenfu [2 ]
Wong, Duncan S. [1 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[2] E China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
基金
中国国家自然科学基金; 高等学校博士学科点专项科研基金;
关键词
Traceability; CP-ABE; blackbox; key-like; policy-specific; ATTRIBUTE-BASED ENCRYPTION; CIPHERTEXTS;
D O I
10.1109/TIFS.2014.2363562
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In Ciphertext-policy attribute-based encryption (CP-ABE), ciphertexts are associated with access policies, which do not have to contain the identities of eligible receivers, and attributes are shared by multiple users. CP-ABE is useful for providing fine-grained access control on encrypted data. However, it also has a practicality concern that a malicious user, with his attributes shared with other users, might leak his decryption privilege as a decryption blackbox, for some financial gain or other incentives, as there is little risk of getting caught. There are two types of decryption blackboxes that reflect different practical scenarios. A key-like decryption blackbox is associated with an attribute set S-D and can decrypt ciphertexts with access policies satisfied by S-D. A policy-specific decryption blackbox is associated with an access policy A(D) and can decrypt ciphertexts with A(D). Policy-specific decryption blackbox has weaker decryption capacity than key-like decryption blackbox, but tracing it is deemed to be more difficult. In the preliminary version (in CCS 2013) of this paper, we proposed a new CP-ABE scheme which is adaptively traceable against key-like decryption blackbox. The scheme has sublinear overhead, which is the most efficient one to date supporting fully collusion-resistant blackbox traceability. The scheme is fully secure in the standard model, and supports any monotonic access structures. In this paper, we further show that the scheme is also selectively traceable against policy-specific decryption blackbox. Furthermore, and more importantly, we prove a general statement that if a CP-ABE scheme is (selectively) traceable against policy-specific decryption blackbox, it is also (selectively) traceable against key-like decryption blackbox, which implies that we now only need to focus on building CP-ABE schemes which are traceable against policy-specific decryption blackbox.
引用
收藏
页码:55 / 68
页数:14
相关论文
共 50 条
  • [31] Smart offloading technique for CP-ABE encryption schemes in constrained devices
    Taha, Mohammad Bany
    Ould-Slimane, Hakima
    Talhi, Chamseddine
    SN APPLIED SCIENCES, 2020, 2 (02):
  • [32] White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively
    Ning, Jianting
    Cao, Zhenfu
    Dong, Xiaolei
    Wei, Lifei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) : 883 - 897
  • [33] Fully Constant-Size CP-ABE with Privacy-Preserving Outsourced Decryption for Lightweight Devices in Cloud-Assisted IoT
    Zhang, Zhishuo
    Zhang, Wei
    Qin, Zhiguang
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [34] Blockchain with Accountable CP-ABE: How to Effectively Protect the Electronic Documents
    Yuan, Chao
    Xu, Mixue
    Si, Xueming
    Li, Bin
    2017 IEEE 23RD INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2017, : 800 - 803
  • [35] A Minimization Number of Final Exponentiations and Inversions for Reducing the Decryption Process Time in ELiPS-Based CP-ABE
    Anh, Le Hoang
    Kawada, Yuta
    Huda, Samsul
    Ali, Md. Arshad
    Kodera, Yuta
    Nogami, Yasuyuki
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2024, 15 (06) : 748 - 755
  • [36] PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems
    Sethi, Kamalakanta
    Pradhan, Ankit
    Bera, Padmalochan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1525 - 1550
  • [37] PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems
    Kamalakanta Sethi
    Ankit Pradhan
    Padmalochan Bera
    Cluster Computing, 2021, 24 : 1525 - 1550
  • [38] A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices
    Xie, Mande
    Ruan, Yingying
    Hong, Haibo
    Shao, Jun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 121 : 114 - 122
  • [39] Poly-ABE: A traceable and revocable fully hidden policy CP-ABE scheme for integrated demand response in multi-energy systems
    Xue, Jingting
    Shi, Lingjie
    Zhang, Wenzheng
    Li, Wenyi
    Zhang, Xiaojun
    Zhou, Yu
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 143
  • [40] Constant Size CP-ABE with Scalable Revocation for Resource-Constrained IoT Devices
    Sethia, Divyashikha
    Shakya, Anadi
    Aggarwal, Ritik
    Bhayana, Saksham
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 951 - 957