Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles

被引:0
|
作者
Liu, Zhen [1 ,2 ]
Cao, Zhenfu [1 ]
Huang, Qiong [3 ]
Wong, Duncan S. [2 ]
Yuen, Tsz Hon [2 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai 200030, Peoples R China
[2] City Univ Hong Kong, Hong Kong, Hong Kong, Peoples R China
[3] South China Agr Univ, Guangzhou, Guangdong, Peoples R China
来源
关键词
Attribute based encryption; ciphertext-policy; multi-authority;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently Lewko and Waters proposed the first fully secure multi-authority ciphertext-policy attribute-based encryption (CP-ABE) system in the random oracle model, and leave the construction of a fully secure multi-authority CP-ABE in the standard model as an open problem. Also, there is no CP-ABE system which can completely prevent individual authorities from decrypting ciphertexts. In this paper, we propose a new multi-authority CP-ABE system which addresses these two problems positively. In this new system, there are multiple Central Authorities (CAs) and Attribute Authorities (AAs), the CAs issue identity-related keys to users and are not involved in any attribute related operations, AAs issue attribute-related keys to users and each AA manages a different domain of attributes. The AAs operate independently from each other and do not need to know the existence of other AAs. Messages can be encrypted under any monotone access structure over the entire attribute universe. The system is adaptively secure in the standard model with adaptive authority corruption, and can support large attribute universe.
引用
下载
收藏
页码:278 / +
页数:5
相关论文
共 50 条
  • [11] An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption
    Balu, A.
    Kuppusamy, K.
    INFORMATION SCIENCES, 2014, 276 : 354 - 362
  • [12] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [13] Lattice-based multi-authority ciphertext-policy attribute-based searchable with attribute revocation for cloud
    Shen, Xiajiong
    Li, Xiaoran
    Yin, Hongjian
    Cao, Chaoyang
    Zhang, Lei
    COMPUTER NETWORKS, 2024, 250
  • [14] Adaptively secure outsourcing ciphertext-policy attribute-based encryption
    Wang, Hao
    Zheng, Zhihua
    Wu, Lei
    Wang, Yilei
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2270 - 2280
  • [15] Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption
    Rao, Y. Sreenivasa
    Dutta, Ratna
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4157 - 4176
  • [16] Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption
    Feng, Xinyu
    Li, Cong
    Li, Dan
    Fang, Yuejian
    Shen, Qingni
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 192 - 204
  • [17] A Fully Secure Ciphertext-Policy Attribute-Based Encryption With a Tree-Based Access Structure
    Rifki, Sadikin
    Park, YoungHo
    Moon, SangJae
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2015, 31 (01) : 247 - 265
  • [18] Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption
    Anada, Hiroaki
    Arita, Seiko
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2017, : 423 - 428
  • [19] Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability
    Kai ZHANG
    Hui LI
    Jianfeng MA
    Ximeng LIU
    Science China(Information Sciences), 2018, 61 (03) : 16 - 28
  • [20] Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability
    Kai Zhang
    Hui Li
    Jianfeng Ma
    Ximeng Liu
    Science China Information Sciences, 2018, 61