Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles

被引:0
|
作者
Liu, Zhen [1 ,2 ]
Cao, Zhenfu [1 ]
Huang, Qiong [3 ]
Wong, Duncan S. [2 ]
Yuen, Tsz Hon [2 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai 200030, Peoples R China
[2] City Univ Hong Kong, Hong Kong, Hong Kong, Peoples R China
[3] South China Agr Univ, Guangzhou, Guangdong, Peoples R China
来源
关键词
Attribute based encryption; ciphertext-policy; multi-authority;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently Lewko and Waters proposed the first fully secure multi-authority ciphertext-policy attribute-based encryption (CP-ABE) system in the random oracle model, and leave the construction of a fully secure multi-authority CP-ABE in the standard model as an open problem. Also, there is no CP-ABE system which can completely prevent individual authorities from decrypting ciphertexts. In this paper, we propose a new multi-authority CP-ABE system which addresses these two problems positively. In this new system, there are multiple Central Authorities (CAs) and Attribute Authorities (AAs), the CAs issue identity-related keys to users and are not involved in any attribute related operations, AAs issue attribute-related keys to users and each AA manages a different domain of attributes. The AAs operate independently from each other and do not need to know the existence of other AAs. Messages can be encrypted under any monotone access structure over the entire attribute universe. The system is adaptively secure in the standard model with adaptive authority corruption, and can support large attribute universe.
引用
下载
收藏
页码:278 / +
页数:5
相关论文
共 50 条
  • [31] Securely outsourcing the ciphertext-policy attribute-based encryption
    Kim Thuat Nguyen
    Oualha, Nouha
    Laurent, Maryline
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01): : 169 - 183
  • [32] GPU Acceleration of Ciphertext-Policy Attribute-Based Encryption
    Fan, Kai
    Zhang, Chaoyu
    Shan, Ruiwen
    Yu, Hexuan
    Jiang, Hai
    2019 20TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2019, : 94 - 101
  • [33] An Improved Ciphertext-Policy Attribute-Based Encryption Scheme
    Zheng, Hua
    Zhang, Xi
    Yang, Qi
    SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 400 - 411
  • [34] Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme
    Asim, Muhammad
    Ibraimi, Luan
    Petkovic, Milan
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 244 - +
  • [35] Searchable Ciphertext-Policy Attribute-Based Encryption with Multi-Keywords for Secure Cloud Storage
    Zhao, Zhiyuan
    Sun, Lei
    Li, Zuohui
    Liu, Ying
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND PATTERN RECOGNITION (ICCPR 2018), 2018, : 35 - 41
  • [36] Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
    Waters, Brent
    PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 53 - 70
  • [37] Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption
    Tseng, Yi-Fan
    Fan, Chun-, I
    Lin, Chih-Wen
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (03) : 182 - 202
  • [38] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    XU Peng
    TANG Yong
    JIANG Wenbin
    JIN Hai
    ZOU Deqing
    Chinese Journal of Electronics, 2014, 23 (04) : 655 - 660
  • [39] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    Xu Peng
    Tang Yong
    Jiang Wenbin
    Jin Hai
    Zou Deqing
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 655 - 660
  • [40] Ciphertext-policy attribute-based encryption with short keys
    Jiang, Wenbin, 1600, Chinese Institute of Electronics (23):