Improving Privacy and Security in Multi-Authority Attribute-Based Encryption

被引:0
|
作者
Chase, Melissa [1 ]
Chow, Sherman S. M. [1 ]
机构
[1] Microsoft Res, Redmond, WA 98052 USA
关键词
attribute based encryption; anonymous credential; privacy; multi-authority; removing trusted party;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attribute based encryption (ABE) [13] determines decryption ability based on a user's attributes In a multi-authority ABE scheme, multiple attribute-authorities monitor different sets of attributes and issue corresponding decryption keys to users, and encryptors can require that a user obtain keys for appropriate attributes from each authority before decrypting a message Chase [5] gave a multi-authority ABE scheme using the concepts of a trusted central authority (CA) and global identifiers (GID). However, the CA in that construction has the power to decrypt every ciphertext, which seems somehow contradictory to the original goal of distributing control over many potentially untrusted authorities. Moreover, in that construction, the use of a consistent GID allowed the authorities to combine their information to build a full profile with all of a user's attributes, which unnecessarily compromises the privacy of the user. In this paper, we propose a solution which removes the trusted central authority, and protects the users' privacy by pi eventing the authorities from pooling their information on particular users, thus making ABE more usable in practice
引用
收藏
页码:121 / 130
页数:10
相关论文
共 50 条
  • [1] Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing
    Yang, Yan
    Chen, Xingyuan
    Chen, Hao
    Du, Xuehui
    IEEE ACCESS, 2018, 6 : 18009 - 18021
  • [2] Correction to "Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing''
    Tan, Syh-Yuan
    IEEE ACCESS, 2019, 7 : 17045 - 17049
  • [3] A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy
    Qi, Fang
    Li, Ke
    Tang, Zhe
    2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 607 - 613
  • [4] A survey on multi-authority and decentralized attribute-based encryption
    Prince Silas Kwesi Oberko
    Victor-Hillary Kofi Setornyo Obeng
    Hu Xiong
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 515 - 533
  • [5] Multi-authority attribute-based encryption with efficient revocation
    Zhang K.
    Ma J.-F.
    Li H.
    Zhang J.-W.
    Zhang T.
    Tongxin Xuebao/Journal on Communications, 2017, 38 (03): : 83 - 91
  • [6] A survey on multi-authority and decentralized attribute-based encryption
    Oberko, Prince Silas Kwesi
    Obeng, Victor-Hillary Kofi Setornyo
    Xiong, Hu
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (01) : 515 - 533
  • [7] Improving File Hierarchy Attribute-Based Encryption Scheme with Multi-authority in Cloud
    Kang, Li
    Zhang, Leyou
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 3 - 18
  • [8] Privacy-Preserving Online/Offline and Outsourced Multi-Authority Attribute-Based Encryption
    Shao, Jiaye
    Zhu, Yanqin
    Ji, Qijin
    2017 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS 2017), 2017, : 285 - 291
  • [9] A Privacy-Preserving Multi-Authority Attribute-Based Encryption Approach for Mobile Healthcare
    Meng, Dacheng
    Luo, Entao
    Wang, Guojun
    PROCEEDINGS 2016 IEEE 13TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS 2016), 2016, : 299 - 306
  • [10] Dynamic Collusion Functional Encryption and Multi-Authority Attribute-Based Encryption
    Garg, Rachit
    Goyal, Rishab
    Lu, George
    PUBLIC-KEY CRYPTOGRAPHY, PT IV, PKC 2024, 2024, 14604 : 69 - 104