Improving Privacy and Security in Multi-Authority Attribute-Based Encryption

被引:0
|
作者
Chase, Melissa [1 ]
Chow, Sherman S. M. [1 ]
机构
[1] Microsoft Res, Redmond, WA 98052 USA
关键词
attribute based encryption; anonymous credential; privacy; multi-authority; removing trusted party;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attribute based encryption (ABE) [13] determines decryption ability based on a user's attributes In a multi-authority ABE scheme, multiple attribute-authorities monitor different sets of attributes and issue corresponding decryption keys to users, and encryptors can require that a user obtain keys for appropriate attributes from each authority before decrypting a message Chase [5] gave a multi-authority ABE scheme using the concepts of a trusted central authority (CA) and global identifiers (GID). However, the CA in that construction has the power to decrypt every ciphertext, which seems somehow contradictory to the original goal of distributing control over many potentially untrusted authorities. Moreover, in that construction, the use of a consistent GID allowed the authorities to combine their information to build a full profile with all of a user's attributes, which unnecessarily compromises the privacy of the user. In this paper, we propose a solution which removes the trusted central authority, and protects the users' privacy by pi eventing the authorities from pooling their information on particular users, thus making ABE more usable in practice
引用
收藏
页码:121 / 130
页数:10
相关论文
共 50 条
  • [21] Multi-authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on Lattices
    Kuchta, Veronika
    Markowitch, Olivier
    PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 409 - 435
  • [22] Multi-authority attribute-based encryption with honest-but-curious central authority
    Bozovic, Vladimir
    Socek, Daniel
    Steinwandt, Rainer
    Villanyi, Viktoria I.
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2012, 89 (03) : 268 - 283
  • [23] Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage
    Ming, Yang
    He, Baokang
    Wang, Chenhao
    IEEE ACCESS, 2021, 9 : 42593 - 42603
  • [24] A Multi-authority Attribute-based Encryption Scheme with Pre-decryption
    Chen, Danwei
    Wan, Liangqing
    Wang, Chen
    Pan, Su
    Ji, Yuting
    2015 SEVENTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP), 2015, : 223 - 228
  • [25] Multi-authority attribute based encryption
    Chase, Melissa
    Theory of Cryptography, Proceedings, 2007, 4392 : 515 - 534
  • [26] TRACEABLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD COMPUTING
    Yang, Xiaodong
    Yang, Ping
    An, Faying
    Zhou, Qixu
    Yang, Miaomiao
    2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 263 - 267
  • [27] A Multi-authority Attribute-Based Encryption Access Control for Social Network
    Yang, Xiao-dong
    Yang, Miao-miao
    Yang, Ping
    Leng, Qi
    CONFERENCE PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON CONTROL SCIENCE AND SYSTEMS ENGINEERING (ICCSSE), 2017, : 671 - 674
  • [28] Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata
    Pradhan, Ankit
    Sethi, Kamalakanta
    Mohapatra, Shrohan
    Bera, Padmalochan
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 434 - 456
  • [29] Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation
    Qian, Huiling
    Li, Jiguo
    Zhang, Yichen
    Han, Jinguang
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (06) : 487 - 497
  • [30] Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation
    Huiling Qian
    Jiguo Li
    Yichen Zhang
    Jinguang Han
    International Journal of Information Security, 2015, 14 : 487 - 497