Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures

被引:17
|
作者
Zhang, Yinghui [1 ,2 ]
Li, Jin [3 ]
Zheng, Dong [1 ]
Chen, Xiaofeng [4 ]
Li, Hui [4 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Guangzhou Univ, Sch Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[4] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Peoples R China
来源
关键词
Attribute-based encryption; User traceability; Authority accountability; Large universe; Full security; Weak public traceability; ABE;
D O I
10.1007/978-3-319-40253-6_31
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic primitive for fine-grained access control on data outsourced to clouds. However, there still exists one critical functionality missing in existing CP-ABE schemes, which is the prevention of key abuse. Specifically, two kinds of key abuse problems are considered in this paper: malicious key sharing among colluding users, and key escrow problem of the semi-trusted authority. For a user, any malicious behavior including illegal key sharing should be traced. For the semi-trusted authority, it should be accountable for its misbehavior including illegal key re-distribution. For better performance and security, it is also indispensable to support large universe and full security in CP-ABE. To the best of our knowledge, none of the existing traceable CP-ABE schemes simultaneously supports large universe and full security. In this paper, we construct a white-box traceable CP-ABE scheme with weak public user traceability, weak public authority accountability and weak public auditing in the sense that no additional secret keys are needed. The scheme supports large universe, and attributes do not need to be pre-specified during the system setup phase. Our scheme is proven fully-secure in the random oracle model and it can take any monotonic access structures as ciphertext policies.
引用
收藏
页码:509 / 524
页数:16
相关论文
共 50 条
  • [1] Large-Universe Attribute-Based Encryption With Public Traceability for Cloud Storage
    Zhang, Zhiting
    Zeng, Peng
    Pan, Bofeng
    Choo, Kim-Kwang Raymond
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10): : 10314 - 10323
  • [2] Anonymous Attribute-Based Encryption with Large Universe and Threshold Access Structures
    Zhang, Yinghui
    Zheng, Dong
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 870 - 874
  • [3] White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures
    Liu, Zhen
    Cao, Zhenfu
    Wong, Duncan S.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (01) : 76 - 88
  • [4] Making Any Attribute-Based Encryption Accountable, Efficiently
    Lai, Junzuo
    Tang, Qiang
    [J]. COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 : 527 - 547
  • [5] Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
    Rouselakis, Yannis
    Waters, Brent
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8975 : 315 - 332
  • [6] Ciphertext-Policy Attribute Based Encryption Supporting Any Monotone Access Structures Without Escrow
    ZHAO Qianqian
    ZHANG Yuqing
    ZHANG Guanghua
    WANG He
    [J]. Chinese Journal of Electronics, 2017, 26 (03) : 640 - 646
  • [7] Ciphertext-Policy Attribute Based Encryption Supporting Any Monotone Access Structures Without Escrow
    Zhao Qianqian
    Zhang Yuqing
    Zhang Guanghua
    Wang He
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (03) : 640 - 646
  • [8] Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access Structures
    Zhang, Liangxuan
    Li, Hui
    Zhang, Yinghui
    Khan, Fawad
    [J]. 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 475 - 482
  • [9] Accountable specific attribute-based encryption scheme for cloud access control
    Nayudu, P. Prathap
    Sekhar, Krovi Raja
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022,
  • [10] Towards accountable authority attribute-based encryption
    王永涛
    Chen Kefei
    Long Yu
    [J]. High Technology Letters, 2013, 19 (01) : 82 - 87