Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles

被引:0
|
作者
Liu, Zhen [1 ,2 ]
Cao, Zhenfu [1 ]
Huang, Qiong [3 ]
Wong, Duncan S. [2 ]
Yuen, Tsz Hon [2 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai 200030, Peoples R China
[2] City Univ Hong Kong, Hong Kong, Hong Kong, Peoples R China
[3] South China Agr Univ, Guangzhou, Guangdong, Peoples R China
来源
关键词
Attribute based encryption; ciphertext-policy; multi-authority;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently Lewko and Waters proposed the first fully secure multi-authority ciphertext-policy attribute-based encryption (CP-ABE) system in the random oracle model, and leave the construction of a fully secure multi-authority CP-ABE in the standard model as an open problem. Also, there is no CP-ABE system which can completely prevent individual authorities from decrypting ciphertexts. In this paper, we propose a new multi-authority CP-ABE system which addresses these two problems positively. In this new system, there are multiple Central Authorities (CAs) and Attribute Authorities (AAs), the CAs issue identity-related keys to users and are not involved in any attribute related operations, AAs issue attribute-related keys to users and each AA manages a different domain of attributes. The AAs operate independently from each other and do not need to know the existence of other AAs. Messages can be encrypted under any monotone access structure over the entire attribute universe. The system is adaptively secure in the standard model with adaptive authority corruption, and can support large attribute universe.
引用
收藏
页码:278 / +
页数:5
相关论文
共 50 条
  • [41] Securely outsourcing the ciphertext-policy attribute-based encryption
    Kim Thuat Nguyen
    Nouha Oualha
    Maryline Laurent
    World Wide Web, 2018, 21 : 169 - 183
  • [42] Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    SENSORS, 2019, 19 (07)
  • [43] Key-Policy Multi-authority Attribute-Based Encryption
    Longo, Riccardo
    Marcolla, Chiara
    Sala, Massimiliano
    ALGEBRAIC INFORMATICS (CAI 2015), 2015, 9270 : 152 - 164
  • [44] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
    Emura, Keita
    Miyaji, Atsuko
    Nomura, Akito
    Omote, Kazumasa
    Soshi, Masakazu
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 13 - +
  • [45] Toward Secure Data Storage in Web 3.0: Ciphertext-Policy Attribute-Based Encryption
    Gong, Bei
    Guo, Chong
    Liu, Yi-Jing
    Wang, Qian
    IEEE NETWORK, 2023, 37 (06): : 42 - 49
  • [46] Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
    Li, Jiguo
    Wang, Haiping
    Zhang, Yichen
    Shen, Jian
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 3339 - 3352
  • [47] Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application
    Ibraimi, Luan
    Petkovic, Milan
    Nikova, Svetla
    Hartel, Pieter
    Jonker, Willem
    INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 309 - +
  • [48] Online/offline ciphertext-policy attribute-based searchable encryption
    Chen D.
    Cao Z.
    Dong X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (10): : 2365 - 2375
  • [49] Ciphertext-Policy Attribute-Based Encryption with Hiding Access Structure
    Yadav, Umesh Chandra
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 23 - 27
  • [50] Novel Constructions for Ciphertext-Policy Attribute-Based Searchable Encryption
    Brigitthe Hinojosa-Cabello, Melissa
    Morales-Sandoval, Miguel
    Marin-Castro, Heidy M.
    2022 IEEE MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE (ENC), 2022,