Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild

被引:51
|
作者
Liu, Zhen [1 ]
Cao, Zhenfu [2 ]
Wong, Duncan S. [1 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[2] E China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
基金
中国国家自然科学基金; 高等学校博士学科点专项科研基金;
关键词
Traceability; CP-ABE; blackbox; key-like; policy-specific; ATTRIBUTE-BASED ENCRYPTION; CIPHERTEXTS;
D O I
10.1109/TIFS.2014.2363562
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In Ciphertext-policy attribute-based encryption (CP-ABE), ciphertexts are associated with access policies, which do not have to contain the identities of eligible receivers, and attributes are shared by multiple users. CP-ABE is useful for providing fine-grained access control on encrypted data. However, it also has a practicality concern that a malicious user, with his attributes shared with other users, might leak his decryption privilege as a decryption blackbox, for some financial gain or other incentives, as there is little risk of getting caught. There are two types of decryption blackboxes that reflect different practical scenarios. A key-like decryption blackbox is associated with an attribute set S-D and can decrypt ciphertexts with access policies satisfied by S-D. A policy-specific decryption blackbox is associated with an access policy A(D) and can decrypt ciphertexts with A(D). Policy-specific decryption blackbox has weaker decryption capacity than key-like decryption blackbox, but tracing it is deemed to be more difficult. In the preliminary version (in CCS 2013) of this paper, we proposed a new CP-ABE scheme which is adaptively traceable against key-like decryption blackbox. The scheme has sublinear overhead, which is the most efficient one to date supporting fully collusion-resistant blackbox traceability. The scheme is fully secure in the standard model, and supports any monotonic access structures. In this paper, we further show that the scheme is also selectively traceable against policy-specific decryption blackbox. Furthermore, and more importantly, we prove a general statement that if a CP-ABE scheme is (selectively) traceable against policy-specific decryption blackbox, it is also (selectively) traceable against key-like decryption blackbox, which implies that we now only need to focus on building CP-ABE schemes which are traceable against policy-specific decryption blackbox.
引用
收藏
页码:55 / 68
页数:14
相关论文
共 50 条
  • [41] How to Hide the Real Receiver Under the Cover Receiver: CP-ABE With Policy Deniability
    Chi, Po-Wen
    Wang, Ming-Hung
    Shiu, Hung-, Jr.
    IEEE ACCESS, 2020, 8 : 89866 - 89881
  • [42] Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud
    Yu, Gang
    Ma, Xiaoxiao
    Cao, Zhenfu
    Zeng, Guang
    Han, Wenbao
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 28 (06) : 705 - 723
  • [43] Expressive CP-ABE Scheme for Mobile Devices in loT Satisfying Constant-Size Keys and Ciphertexts
    Odelu, Vanga
    Das, Ashok Kumar
    Khan, Muhammad Khurram
    Choo, Kim-Kwang Raymond
    Jo, Minho
    IEEE ACCESS, 2017, 5 : 3273 - 3283
  • [44] Fine-grained access control of files stored in cloud storage with traceable and revocable multi-authority CP-ABE scheme
    Mishra, Bharati
    Jena, Debasish
    Patnaik, Srikanta
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2023, 14 (04) : 320 - 338
  • [45] An enhanced traceable access control scheme based on multi-authority CP-ABE for cloud-assisted e-health system
    Liu, Xiao
    Wei, Zhenyang
    Li, Gaoxiang
    Chen, Jining
    COMPUTER NETWORKS, 2024, 254
  • [46] Dual Hybrid CP-ABE: How to Provide Forward Security Without a Trusted Authority in Vehicular Opportunistic Computing
    Meng, Lei
    Xu, Haitao
    Tang, Runze
    Zhou, Xianwei
    Han, Zhu
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (05): : 8800 - 8814
  • [47] A comprehensive and efficient CP-ABE scheme with full policy hiding and pre-decryption verification in peer-to-peer cyber-physical systems
    Zhao, Xingwen
    Wang, Xuan
    Guan, Haimei
    Cai, Jiayin
    Li, Hui
    Li, Qingwen
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2025, 18 (02)
  • [48] Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography
    Odelu, Vanga
    Das, Ashok Kumar
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4048 - 4059
  • [49] A partially hidden policy CP-ABE scheme against attribute values guessing attacks with online privacy-protective decryption testing in IoT assisted cloud computing
    Zhang, Zhishuo
    Zhang, Wei
    Qin, Zhiguang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 123 : 181 - 195
  • [50] A Survey on Ciphertext-Policy Attribute-based Encryption (CP-ABE) Approaches to Data Security on Mobile Devices and its Application to loT
    Moffat, Steve
    Hammoudeh, Mohammad
    Hegarty, Robert
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (ICFNDS '17), 2017,