Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures

被引:17
|
作者
Zhang, Yinghui [1 ,2 ]
Li, Jin [3 ]
Zheng, Dong [1 ]
Chen, Xiaofeng [4 ]
Li, Hui [4 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Guangzhou Univ, Sch Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[4] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Peoples R China
来源
关键词
Attribute-based encryption; User traceability; Authority accountability; Large universe; Full security; Weak public traceability; ABE;
D O I
10.1007/978-3-319-40253-6_31
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic primitive for fine-grained access control on data outsourced to clouds. However, there still exists one critical functionality missing in existing CP-ABE schemes, which is the prevention of key abuse. Specifically, two kinds of key abuse problems are considered in this paper: malicious key sharing among colluding users, and key escrow problem of the semi-trusted authority. For a user, any malicious behavior including illegal key sharing should be traced. For the semi-trusted authority, it should be accountable for its misbehavior including illegal key re-distribution. For better performance and security, it is also indispensable to support large universe and full security in CP-ABE. To the best of our knowledge, none of the existing traceable CP-ABE schemes simultaneously supports large universe and full security. In this paper, we construct a white-box traceable CP-ABE scheme with weak public user traceability, weak public authority accountability and weak public auditing in the sense that no additional secret keys are needed. The scheme supports large universe, and attributes do not need to be pre-specified during the system setup phase. Our scheme is proven fully-secure in the random oracle model and it can take any monotonic access structures as ciphertext policies.
引用
收藏
页码:509 / 524
页数:16
相关论文
共 50 条
  • [41] Large Universe Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage
    Lian, Huijie
    Wang, Qingxian
    Wang, Guangbo
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2020, 17 (01) : 107 - 117
  • [42] An Attribute-based Searchable Encryption Scheme Supporting Trapdoor Updating
    Xu, Jingjing
    Ying, Chun
    Tan, Shuhua
    Sun, Zhe
    Wang, Pan
    Sun, Zhixin
    [J]. 2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 7 - 14
  • [43] Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
    Sun L.
    Zhao Z.
    Wang J.
    Zhu Z.
    [J]. Tongxin Xuebao/Journal on Communications, 2019, 40 (05): : 47 - 56
  • [44] Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
    Ning, Jianting
    Cao, Zhenfu
    Dong, Xiaolei
    Wei, Lifei
    Lin, Xiaodong
    [J]. COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 55 - 72
  • [45] Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes
    Attrapadung, Nuttapong
    Imai, Hideki
    [J]. CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2009, 5921 : 278 - 300
  • [46] Efficiently Supporting Attribute-Based Access Control in Linux
    Varshith, H. O. Sai
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2012 - 2026
  • [47] Cross-Domain Attribute-Based Access Control Encryption
    Sedaghat, Mahdi
    Preneel, Bart
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2021, 2021, 13099 : 3 - 23
  • [48] ABSTRACT: Access Control in Searchable Encryption with the use of Attribute-Based Encryption and SGX
    Michalas, Antonis
    Bakas, Alexandros
    Hai-Van Dang
    Zalitko, Alexandr
    [J]. CCSW'19: PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON CLOUD COMPUTING SECURITY WORKSHOP, 2019, : 183 - 183
  • [49] Complex and flexible data access policy in attribute-based encryption
    Hu, Shengzhou
    Wang, Xingfu
    He, Hua
    Zhong, Tingting
    [J]. JOURNAL OF SUPERCOMPUTING, 2022, 78 (01): : 1010 - 1029
  • [50] Secure access privilege delegation using attribute-based encryption
    Panda, Suryakanta
    Mondal, Samrat
    Das, Ashok Kumar
    Susilo, Willy
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1261 - 1276