Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption

被引:119
|
作者
Han, Jinguang [1 ,2 ]
Susilo, Willy [1 ]
Mu, Yi [1 ]
Yan, Jun [3 ]
机构
[1] Univ Wollongong, Ctr Comp & Informat Secur Res, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
[2] Hohai Univ, Coll Sci, Nanjing 210098, Jiangsu, Peoples R China
[3] Univ Wollongong, Sch Informat Syst & Technol, Wollongong, NSW 2522, Australia
关键词
Attribute-based encryption; multiauthority; privacy-preserving extract protocol; access control; privacy; IDENTITY-BASED ENCRYPTION; MULTI-AUTHORITY; BLIND;
D O I
10.1109/TPDS.2012.50
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Decentralized attribute-based encryption (ABE) is a variant of a multiauthority ABE scheme where each authority can issue secret keys to the user independently without any cooperation and a central authority. This is in contrast to the previous constructions, where multiple authorities must be online and setup the system interactively, which is impractical. Hence, it is clear that a decentralized ABE scheme eliminates the heavy communication cost and the need for collaborative computation in the setup stage. Furthermore, every authority can join or leave the system freely without the necessity of reinitializing the system. In contemporary multiauthority ABE schemes, a user's secret keys from different authorities must be tied to his global identifier (GID) to resist the collusion attack. However, this will compromise the user's privacy. Multiple authorities can collaborate to trace the user by his GID, collect his attributes, then impersonate him. Therefore, constructing a decentralized ABE scheme with privacy-preserving remains a challenging research problem. In this paper, we propose a privacy-preserving decentralized key-policy ABE scheme where each authority can issue secret keys to a user independently without knowing anything about his GID. Therefore, even if multiple authorities are corrupted, they cannot collect the user's attributes by tracing his GID. Notably, our scheme only requires standard complexity assumptions (e.g., decisional bilinear Diffie-Hellman) and does not require any cooperation between the multiple authorities, in contrast to the previous comparable scheme that requires nonstandard complexity assumptions (e.g., q-decisional Diffie-Hellman inversion) and interactions among multiple authorities. To the best of our knowledge, it is the first decentralized ABE scheme with privacy-preserving based on standard complexity assumptions.
引用
收藏
页码:2150 / 2162
页数:13
相关论文
共 50 条
  • [1] Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Schemes with Fast Decryption
    Rao, Y. Sreenivasa
    [J]. INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 521 - 531
  • [2] Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme
    Ge, Aijun
    Zhang, Jiang
    Zhang, Rui
    Ma, Chuangui
    Zhang, Zhenfeng
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (11) : 2319 - 2321
  • [3] User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
    Rahulamathavan, Yogachandran
    Veluru, Suresh
    Han, Jinguang
    Li, Fei
    Rajarajan, Muttukrishnan
    Lu, Rongxing
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (09) : 2939 - 2946
  • [4] Privacy-Preserving Decentralized Key-Policy Attribute-Based Signcryption in Cloud Computing Environments
    Meng Xian Yong
    Chen Zhong
    Meng Xiang Yu
    [J]. SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS II, PTS 1 AND 2, 2014, 475-476 : 1144 - +
  • [5] Large universe decentralized key-policy attribute-based encryption
    Li, Qi
    Ma, Jianfeng
    Li, Rui
    Xiong, Jinbo
    Liu, Ximeng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (03) : 501 - 509
  • [6] A Novel Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Anonymous Key Generation
    Yin, Hongjian
    Zhang, Leyou
    Mu, Yi
    [J]. CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 435 - 446
  • [7] Novel Secure Privacy-Preserving Decentralized Attribute-Based Encryption
    Liang, Pengfei
    Zhang, Leyou
    Shang, Yujie
    [J]. FRONTIERS IN CYBER SECURITY, 2018, 879 : 66 - 80
  • [8] Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption
    Zhang, Leyou
    Liang, Pengfei
    Mu, Yi
    [J]. IEEE ACCESS, 2018, 6 : 12736 - 12745
  • [9] A Key-Policy Attribute-Based Broadcast Encryption
    Sun, Jin
    Hu, Yupu
    Zhang, Leyou
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (05) : 444 - 452
  • [10] Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme
    Wang, Minqian
    Zhang, Zhenfeng
    Chen, Cheng
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04): : 1237 - 1245