Data User-Based Attribute Based Encryption

被引:0
|
作者
Meamari, Ehsan [1 ]
Guo, Hao [1 ]
Shen, Chien-Chung [1 ]
Zhang, Rui [1 ]
机构
[1] Univ Delaware, Dept Comp & Informat Sci, Newark, DE 19716 USA
关键词
Attribute Based Encryption; ABE; CP-ABE; Decentralization;
D O I
10.1109/CISS48834.2020.1570617276
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute Based Encryption (ABE) has emerged as an informtion-centric public key cryptographic system which allows a data owner to share data, according to an access policy, with multiple data users based on the attributes they possess, without knowing their identities. In the original ABE schemes, a central authority administrates the system and issues secret keys to data users based on their attributes and both the owner and users need to trust a specific CA. However, in certain real-world applications, the data users would not trust anyone but themselves. For such situations, we introduce a new decentralization model of ABE, termed Data User-based ABE (DU-ABE), which is managed jointly by the data users. DU-ABE is the first decentralized ABE scheme which replaces the authorities with the data users without employing any other extra entities.
引用
收藏
页码:313 / 317
页数:5
相关论文
共 50 条
  • [1] Data Owner Based Attribute Based Encryption
    Zhang, Jindan
    Wang, Xu An
    Ma, Jianfeng
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 144 - 148
  • [2] Multi-user Attribute Based Searchable Encryption
    Kaushik, Kulvaibhav
    Varadharajan, Vijayaraghavan
    Nallusamy, Rajarathnam
    2013 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2013), VOL 2, 2013, : 200 - 205
  • [3] Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
    Wang, Guojun
    Liu, Qin
    Wu, Jie
    Guo, Minyi
    COMPUTERS & SECURITY, 2011, 30 (05) : 320 - 331
  • [4] User-based Document Ranking
    Kubek, Mario M.
    Meesad, Phayung
    Unger, Herwig
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION AND INFORMATION PROCESSING (ICCIP 2017), 2017, : 119 - 123
  • [5] User-based Opinion-based Recommendation
    Dong, Ruihai
    Smyth, Barry
    PROCEEDINGS OF THE TWENTY-SIXTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 4821 - 4825
  • [6] Attribute-Based Encryption for Named Data Networking
    Lenin, Aleksandr
    Laud, Peeter
    PROCEEDINGS OF THE 2021 8TH ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ICN '21), 2021, : 118 - 120
  • [7] User Privacy Protection Scheme Based on Verifiable Outsourcing Attribute-Based Encryption
    Sheng, Luo
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021 (2021)
  • [8] User-Based Evaluation of Data-Driven Haptic Rendering
    Hoever, Raphael
    Di Luca, Massimiliano
    Harders, Matthias
    ACM TRANSACTIONS ON APPLIED PERCEPTION, 2010, 8 (01)
  • [9] Oriented User Group Verifiable Attribute-Based Encryption Scheme
    Liu, Xueyan
    Li, Zhanming
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 415 - 426
  • [10] Searchable Attribute-based Encryption Scheme for Dynamic User Groups
    Wang J.-W.
    Ning J.-T.
    Xu S.-M.
    Yin X.-C.
    Chen H.-X.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (04): : 1907 - 1925