Making Any Attribute-Based Encryption Accountable, Efficiently

被引:17
|
作者
Lai, Junzuo [1 ,2 ]
Tang, Qiang [3 ]
机构
[1] Jinan Univ, Guangzhou, Guangdong, Peoples R China
[2] State Key Lab Cryptol, Beijing, Peoples R China
[3] New Jersey Inst Technol, Newark, NJ 07102 USA
来源
基金
中国国家自然科学基金;
关键词
D O I
10.1007/978-3-319-98989-1_26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) as one of the most interesting multi-recipient public encryption systems, naturally requires some "tracing mechanisms" to identify misbehaving users to foster accountability when unauthorized key re-distributions are taken place. We give a generic construction of (black-box) traceable ABE which only doubles the ciphertext size of the underlying ABE scheme. When instantiating properly, it yields the first such scheme with constant size ciphertext and expressive access control. Furthermore, we extend our generic construction of traceable ABE to support authority accountability. This property is essential for generating an un-deniable proof for user misbehaviors. Our new generic construction gives the first black-box traceable ABE with authority accountability, and constant size ciphertext. All properties are achieved in standard security models.
引用
收藏
页码:527 / 547
页数:21
相关论文
共 50 条
  • [1] Making Any Identity-Based Encryption Accountable, Efficiently
    Kiayias, Aggelos
    Tang, Qiang
    [J]. COMPUTER SECURITY - ESORICS 2015, PT I, 2015, 9326 : 326 - 346
  • [2] Towards accountable authority attribute-based encryption
    王永涛
    Chen Kefei
    Long Yu
    [J]. High Technology Letters, 2013, 19 (01) : 82 - 87
  • [3] Accountable authority key policy attribute-based encryption
    WANG YongTao 1
    2 China Information Technology Security Evaluation Center
    3 Shanghai Key Laboratory of Scalable Computing and Systems
    4 State Key Laboratory of Information Security
    [J]. Science China(Information Sciences), 2012, 55 (07) : 1631 - 1638
  • [4] Accountable authority key policy attribute-based encryption
    Wang YongTao
    Chen KeFei
    Long Yu
    Liu ZhaoHui
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (07) : 1631 - 1638
  • [5] Accountable authority key policy attribute-based encryption
    YongTao Wang
    KeFei Chen
    Yu Long
    ZhaoHui Liu
    [J]. Science China Information Sciences, 2012, 55 : 1631 - 1638
  • [6] Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures
    Zhang, Yinghui
    Li, Jin
    Zheng, Dong
    Chen, Xiaofeng
    Li, Hui
    [J]. INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 509 - 524
  • [7] Accountable specific attribute-based encryption scheme for cloud access control
    Nayudu, P. Prathap
    Sekhar, Krovi Raja
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022,
  • [8] Attribute-Based Encryption for Circuits
    Gorbunov, Sergey
    Vaikuntanathan, Vinod
    Wee, Hoeteck
    [J]. STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2013, : 545 - 554
  • [9] Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage
    Wang, Shangping
    Zhang, Duo
    Zhang, Yaling
    Liu, Lihua
    [J]. IEEE ACCESS, 2018, 6 : 30444 - 30457
  • [10] Decentralizing Attribute-Based Encryption
    Lewko, Allison
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 568 - 588