Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles

被引:0
|
作者
Liu, Zhen [1 ,2 ]
Cao, Zhenfu [1 ]
Huang, Qiong [3 ]
Wong, Duncan S. [2 ]
Yuen, Tsz Hon [2 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai 200030, Peoples R China
[2] City Univ Hong Kong, Hong Kong, Hong Kong, Peoples R China
[3] South China Agr Univ, Guangzhou, Guangdong, Peoples R China
来源
关键词
Attribute based encryption; ciphertext-policy; multi-authority;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently Lewko and Waters proposed the first fully secure multi-authority ciphertext-policy attribute-based encryption (CP-ABE) system in the random oracle model, and leave the construction of a fully secure multi-authority CP-ABE in the standard model as an open problem. Also, there is no CP-ABE system which can completely prevent individual authorities from decrypting ciphertexts. In this paper, we propose a new multi-authority CP-ABE system which addresses these two problems positively. In this new system, there are multiple Central Authorities (CAs) and Attribute Authorities (AAs), the CAs issue identity-related keys to users and are not involved in any attribute related operations, AAs issue attribute-related keys to users and each AA manages a different domain of attributes. The AAs operate independently from each other and do not need to know the existence of other AAs. Messages can be encrypted under any monotone access structure over the entire attribute universe. The system is adaptively secure in the standard model with adaptive authority corruption, and can support large attribute universe.
引用
下载
收藏
页码:278 / +
页数:5
相关论文
共 50 条
  • [1] ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, 2009, 46 (04) : 803 - 819
  • [2] Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption
    Li, Qi
    Ma, Jianfeng
    Li, Rui
    Xiong, Jinbo
    Liu, Ximeng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4098 - 4109
  • [3] A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation
    Li, Jiguo
    Hu, Shengzhou
    Zhang, Yichen
    Han, Jinguang
    SOFT COMPUTING, 2020, 24 (03) : 1869 - 1882
  • [4] A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation
    Jiguo Li
    Shengzhou Hu
    Yichen Zhang
    Jinguang Han
    Soft Computing, 2020, 24 : 1869 - 1882
  • [5] Privacy-Preserving Multi-authority Ciphertext-Policy Attribute-Based Encryption with Revocation
    Ma, Hua
    Dong, Enting
    Liu, Zhenhua
    Zhang, Linchao
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2017, 2018, 12 : 811 - 820
  • [6] Efficient and Fully Secure Forward Secure Ciphertext-Policy Attribute-Based Encryption
    Kitagawa, Takashi
    Kojima, Hiroki
    Attrapadung, Nuttapong
    Imai, Hideki
    INFORMATION SECURITY (ISC 2013), 2015, 7807 : 87 - 99
  • [7] Blockchain-Based Multi-Authority Ciphertext-Policy Attribute-Based Encryption Scheme with Equality Test
    Yang X.-D.
    Chen A.-J.
    Wang Z.-S.
    Liao Z.-F.
    Wang C.-F.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2024, 52 (03): : 898 - 908
  • [8] Fully secure Ciphertext-policy Attribute-Based Encryption in Prime Order Group
    Lu, Songfeng
    Zhang, Yu
    Sun, Jie
    Yang, Liping
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 2920 - 2923
  • [9] Ciphertext-policy attribute-based encryption scheme with verifiability on authority
    Yu J.
    He X.
    Yan X.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (04): : 49 - 57
  • [10] Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Wu, Yulin
    Yiu, S. M.
    2018 IEEE INT CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, UBIQUITOUS COMPUTING & COMMUNICATIONS, BIG DATA & CLOUD COMPUTING, SOCIAL COMPUTING & NETWORKING, SUSTAINABLE COMPUTING & COMMUNICATIONS, 2018, : 1003 - 1008