Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability

被引:47
|
作者
Zhang, Kai [1 ]
Li, Hui [2 ]
Ma, Jianfeng [3 ]
Liu, Ximeng [4 ]
机构
[1] Xidian Univ, Sch Telecommun Engn, Xian 710071, Shaanxi, Peoples R China
[2] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[3] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Shaanxi, Peoples R China
[4] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
attribute-based encryption; multi-authority; ciphertext-policy; traceability; large universe;
D O I
10.1007/s11432-016-9019-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traceable multi-authority ciphertext-policy attribute-based encryption (CP-ABE) is a practical encryption method that can achieve user traceability and fine-grained access control simultaneously. However, existing traceable multi-authority CP-ABE schemes have two main limitations that prevent them from practical applications. First, these schemes only support small universe: the attributes must be fixed at system setup and the attribute space is restricted to polynomial size. Second, the schemes are either less expressive (the access policy is limited to "AND gates with wildcard") or inefficient (the system is constructed in composite order bilinear groups). To address these limitations, we present a traceable large universe multi-authority CP-ABE scheme, and further prove that it is statically secure in the random oracle model. Compared with existing traceable multi-authority CP-ABE schemes, the proposed scheme has four advantages. First, the attributes are not fixed at setup and the attribute universe is not bounded to polynomial size. Second, the ciphertext polices can be expressed as any monotone access structures. Third, the proposed scheme is constructed in prime order groups, which makes this scheme more efficient than those in composite order bilinear groups. Finally, the proposed scheme requires neither a central authority nor an identity table for tracing.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [22] Lattice-based multi-authority ciphertext-policy attribute-based searchable with attribute revocation for cloud
    Shen, Xiajiong
    Li, Xiaoran
    Yin, Hongjian
    Cao, Chaoyang
    Zhang, Lei
    COMPUTER NETWORKS, 2024, 250
  • [23] Updatable Ciphertext-Policy Attribute-Based Encryption Scheme With Traceability and Revocability
    Liu, Zhenhua
    Xu, Jing
    Liu, Yan
    Wang, Baocang
    IEEE ACCESS, 2019, 7 : 66832 - 66844
  • [24] Large-Universe Attribute-Based Encryption With Public Traceability for Cloud Storage
    Zhang, Zhiting
    Zeng, Peng
    Pan, Bofeng
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10): : 10314 - 10323
  • [25] New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems
    Wang, Hao
    Zheng, Zhihua
    Wu, Lei
    He, Debiao
    JOURNAL OF HIGH SPEED NETWORKS, 2016, 22 (02) : 153 - 167
  • [26] Ciphertext-policy attribute-based delay encryption
    Chen, Lijiao
    Lv, Kewei
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (02) : 167 - 185
  • [27] An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme with Policy Update
    Wang, Changji
    Yuan, Yuan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (02): : 1031 - 1041
  • [28] An Efficient Ciphertext-policy Attribute-based Encryption on Ideal Lattices
    Zhao Jian
    Gao Haiying
    Hu Bin
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (07) : 1652 - 1660
  • [29] New Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation
    Zu, Longhui
    Liu, Zhenhua
    Li, Juanjuan
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 281 - 287
  • [30] Optimized Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation
    Li, Yang
    Zhu, Jianming
    Wang, Xiuli
    Chai, Yanmei
    Shao, Shuai
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 385 - 394