Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability

被引:47
|
作者
Zhang, Kai [1 ]
Li, Hui [2 ]
Ma, Jianfeng [3 ]
Liu, Ximeng [4 ]
机构
[1] Xidian Univ, Sch Telecommun Engn, Xian 710071, Shaanxi, Peoples R China
[2] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[3] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Shaanxi, Peoples R China
[4] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
attribute-based encryption; multi-authority; ciphertext-policy; traceability; large universe;
D O I
10.1007/s11432-016-9019-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traceable multi-authority ciphertext-policy attribute-based encryption (CP-ABE) is a practical encryption method that can achieve user traceability and fine-grained access control simultaneously. However, existing traceable multi-authority CP-ABE schemes have two main limitations that prevent them from practical applications. First, these schemes only support small universe: the attributes must be fixed at system setup and the attribute space is restricted to polynomial size. Second, the schemes are either less expressive (the access policy is limited to "AND gates with wildcard") or inefficient (the system is constructed in composite order bilinear groups). To address these limitations, we present a traceable large universe multi-authority CP-ABE scheme, and further prove that it is statically secure in the random oracle model. Compared with existing traceable multi-authority CP-ABE schemes, the proposed scheme has four advantages. First, the attributes are not fixed at setup and the attribute universe is not bounded to polynomial size. Second, the ciphertext polices can be expressed as any monotone access structures. Third, the proposed scheme is constructed in prime order groups, which makes this scheme more efficient than those in composite order bilinear groups. Finally, the proposed scheme requires neither a central authority nor an identity table for tracing.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme
    Asim, Muhammad
    Ibraimi, Luan
    Petkovic, Milan
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 244 - +
  • [42] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    XU Peng
    TANG Yong
    JIANG Wenbin
    JIN Hai
    ZOU Deqing
    Chinese Journal of Electronics, 2014, 23 (04) : 655 - 660
  • [43] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    Xu Peng
    Tang Yong
    Jiang Wenbin
    Jin Hai
    Zou Deqing
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 655 - 660
  • [44] Ciphertext-policy attribute-based encryption with short keys
    Jiang, Wenbin, 1600, Chinese Institute of Electronics (23):
  • [45] Securely outsourcing the ciphertext-policy attribute-based encryption
    Kim Thuat Nguyen
    Nouha Oualha
    Maryline Laurent
    World Wide Web, 2018, 21 : 169 - 183
  • [46] Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    SENSORS, 2019, 19 (07)
  • [47] Key-Policy Multi-authority Attribute-Based Encryption
    Longo, Riccardo
    Marcolla, Chiara
    Sala, Massimiliano
    ALGEBRAIC INFORMATICS (CAI 2015), 2015, 9270 : 152 - 164
  • [48] Efficient quantum multi-authority attribute-based encryption and generalizations
    Chaudhury, Shion Samadder
    QUANTUM INFORMATION PROCESSING, 2024, 23 (10)
  • [49] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
    Emura, Keita
    Miyaji, Atsuko
    Nomura, Akito
    Omote, Kazumasa
    Soshi, Masakazu
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 13 - +
  • [50] Efficient Ciphertext-Policy Attribute-Based Online/Offline Encryption with User Revocation
    Ma, Haiying
    Wang, Zhanjun
    Guan, Zhijin
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019