An Efficient and Anonymous Attribute-Based Group Setup Scheme

被引:0
|
作者
Li, Bing [1 ]
Wang, Zhijie [1 ]
Huang, Dijiang [1 ]
机构
[1] Arizona State Univ, Tempe, AZ 85281 USA
关键词
group communication; attribute based encryption; anonymity;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In many secure application scenarios, establishing a temporary group without revealing group member information is difficult but desirable. Secure group communication can significantly reduce the computation and communication overhead. Traditional group key management schemes are based on a hierarchical tree. Any network entity who wants to set up a group needs to know the keys of the other group members, i.e., the group key establishment must be done before starting the group communication. As a result, the group needs the group formation beforehand. In this paper, we propose a secure grouping scheme providing anonymity for group members to outsiders. Our approach is based on Attribute Based Encryption (ABE) schemes. In our scheme, each network entity is assigned with a set of attributes. Each group is identified by a logical combination of attributes, i.e., the group access policies. The presented solution has an advantage that there is no need for any prior knowledge of other group members. Instead, the sender just needs to focus on the group access policies. Our scheme further preserves the group formation policies by using a gradual exposure method on attributes. Compared to existing hidden-policy schemes, our solution can greatly reduce the computation and communication overhead.
引用
收藏
页码:861 / 866
页数:6
相关论文
共 50 条
  • [31] Attribute-based anonymous credential: Delegation, traceability, and revocation
    Li, Peng
    Lai, Junzuo
    Yang, Ye
    Sun, Meng
    Wu, Chi
    Wu, Wei
    Yuan, Xiaowei
    [J]. COMPUTER NETWORKS, 2023, 237
  • [32] A Hierarchical Attribute-Based Encryption Scheme
    ZOU Xiubin
    [J]. Wuhan University Journal of Natural Sciences, 2013, 18 (03) : 259 - 264
  • [33] On the Security of an Attribute-Based Signature Scheme
    Tan, Syh-Yuan
    Heng, Swee-Huay
    Goi, Bok-Min
    [J]. U- AND E-SERVICE, SCIENCE AND TECHNOLOGY, 2009, 62 : 161 - +
  • [34] A Dynamic Attribute-Based Authentication Scheme
    Yang, Huihui
    Oleshchuk, Vladimir A.
    [J]. CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 106 - 118
  • [35] Attribute-Based Encryption Scheme Based on SIFF
    Zhao, Tianyu
    Wei, Lingbo
    Zhang, Chi
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [36] An efficient attribute-based hierarchical data access control scheme in cloud computing
    He, Heng
    Zheng, Liang-han
    Li, Peng
    Deng, Li
    Huang, Li
    Chen, Xiang
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2020, 10 (01)
  • [37] ATTRIBUTE-BASED GROUP KEY ESTABLISHMENT
    Steinwandt, Rainer
    Suarez Corona, Adriana
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2010, 4 (03) : 381 - 398
  • [38] Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption
    Rao, Y. Sreenivasa
    Dutta, Ratna
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4157 - 4176
  • [39] Anonymous Electronic Health Record Sharing Scheme Based on Decentralized Hierarchical Attribute-Based Encryption in Cloud Environment
    Liu, Xueyan
    Yang, Xiaotao
    Luo, Yukun
    Wang, Li
    Zhang, Qiang
    [J]. IEEE ACCESS, 2020, 8 : 200180 - 200193
  • [40] Secure and Efficient Personal Health Record Scheme Using Attribute-Based Encryption
    Fan, Kai
    Huang, Nana
    Wang, Yue
    Li, Hui
    Yang, Yintang
    [J]. 2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 111 - 114