Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles

被引:0
|
作者
Liu, Zhen [1 ,2 ]
Cao, Zhenfu [1 ]
Huang, Qiong [3 ]
Wong, Duncan S. [2 ]
Yuen, Tsz Hon [2 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai 200030, Peoples R China
[2] City Univ Hong Kong, Hong Kong, Hong Kong, Peoples R China
[3] South China Agr Univ, Guangzhou, Guangdong, Peoples R China
来源
关键词
Attribute based encryption; ciphertext-policy; multi-authority;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently Lewko and Waters proposed the first fully secure multi-authority ciphertext-policy attribute-based encryption (CP-ABE) system in the random oracle model, and leave the construction of a fully secure multi-authority CP-ABE in the standard model as an open problem. Also, there is no CP-ABE system which can completely prevent individual authorities from decrypting ciphertexts. In this paper, we propose a new multi-authority CP-ABE system which addresses these two problems positively. In this new system, there are multiple Central Authorities (CAs) and Attribute Authorities (AAs), the CAs issue identity-related keys to users and are not involved in any attribute related operations, AAs issue attribute-related keys to users and each AA manages a different domain of attributes. The AAs operate independently from each other and do not need to know the existence of other AAs. Messages can be encrypted under any monotone access structure over the entire attribute universe. The system is adaptively secure in the standard model with adaptive authority corruption, and can support large attribute universe.
引用
下载
收藏
页码:278 / +
页数:5
相关论文
共 50 条
  • [21] Ciphertext-policy attribute-based delay encryption
    Chen, Lijiao
    Lv, Kewei
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (02) : 167 - 185
  • [22] Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability
    Zhang, Kai
    Li, Hui
    Ma, Jianfeng
    Liu, Ximeng
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
  • [23] Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes
    Ibraimi, Luan
    Tang, Qiang
    Hartel, Pieter
    Jonker, Willem
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 1 - 12
  • [24] Forward-secure ciphertext-policy attribute-based encryption scheme
    State Key Laboratory of Mathematical Engineering and Advanced Computing, PLA Information Engineering University, Zhengzhou
    450001, China
    Wei, Jiang-Hong, 1600, Editorial Board of Journal on Communications (35):
  • [25] Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating
    Ying, Zuobin
    Li, Hui
    Ma, Jianfeng
    Zhang, Junwei
    Cui, Jiangtao
    SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (04)
  • [26] Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating
    Zuobin YING
    Hui LI
    Jianfeng MA
    Junwei ZHANG
    Jiangtao CUI
    Science China(Information Sciences), 2016, 59 (04) : 187 - 202
  • [27] Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator
    Chen, Yuechen
    Jiang, Zoe L.
    Yiu, S. M.
    Liu, Joseph K.
    Au, Man Ho
    Wang, Xuan
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 274 - 289
  • [28] Practical Multi-Authority Ciphertext Policy Attribute-Based Encryption from R-LWE
    Sun, Jianguo
    Qiao, Yuqing
    Liu, Zechao
    Chen, Yitao
    Yang, Yang
    19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021), 2021, : 1435 - 1443
  • [29] Multi authority Ciphertext-Policy Attribute-Based encryption for security enhancement in cloud storage unit
    Catherine, V. Reena
    Nargunam, A. Shajin
    SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS, 2022, 53
  • [30] Server Aided Ciphertext-Policy Attribute-Based Encryption
    Wang, Hao
    Yang, Bo
    Wang, Yilei
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 440 - 444