Attribute-Based Traitor Tracing

被引:2
|
作者
Wang, Yong-Tao [1 ]
Chen, Ke-Fei [1 ,2 ]
Chen, Jian-Hong [1 ,3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Natl Lab Modern Commun, Chengdu 610041, Peoples R China
[3] Huaiyin Inst Technol, Huaian 223003, Peoples R China
基金
中国国家自然科学基金;
关键词
attribute-based encryption; traitor tracing; access rights; collusion; decryption device; IDENTITY-BASED ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we focus on traitor tracing scheme in attribute-based encryption (ABE) scenarios. A well-known concern in the setting of attribute-based encryption is that a user (or set of colluding users) can create a new key (or decryption device) by using his legal one and distribute it for malicious use. To mitigate this problem, we introduce the notion of attribute-based traitor tracing (ABTT). We formalize the definitions and security notions for attribute-based traitor tracing scheme, and then present a construction of AB-TT. Our scheme makes use of the identity-based traitor tracing technology proposed by Abdalla et al., and is based on the second construction of Sahai-Waters' attribute-based encryption schemes, but in the asymmetric bilinear setting. Our scheme is shown to be secure in the standard model under some reasonable assumptions. To the best of our knowledge, this is the first ABTT scheme up to now.
引用
收藏
页码:181 / 195
页数:15
相关论文
共 50 条
  • [1] An attribute-based encryption scheme for traitor tracing and revocation together
    Ma, Hai-Ying
    Zeng, Guo-Sun
    Jisuanji Xuebao/Chinese Journal of Computers, 2012, 35 (09): : 1845 - 1855
  • [2] Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large UniverseaEuro
    Liu, Zhen
    Wong, Duncan S.
    COMPUTER JOURNAL, 2016, 59 (07): : 983 - 1004
  • [3] Traitor-Tracing from LWE Made Simple and Attribute-Based
    Chen, Yilei
    Vaikuntanathan, Vinod
    Waters, Brent
    Wee, Hoeteck
    Wichs, Daniel
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT II, 2018, 11240 : 341 - 369
  • [4] Generic Codes Based Traitor Tracing and Revoking Scheme from Attribute-Based Encryption
    Zhao, Xingwen
    Zhao, Gaofei
    Li, Hui
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 299 - 306
  • [5] Attribute-Based Signatures with Advanced Delegation, and Tracing
    Delerablee, Cecile
    Gouriou, Lenaick
    Pointcheval, David
    TOPICS IN CRYPTOLOGY, CT-RSA 2024, 2024, 14643 : 224 - 248
  • [6] Secured tracing for group signatures from attribute-based encryption
    Perera, Maharage Nisansala Sevwandi
    Matsunaka, Takashi
    Yokoyama, Hiroyuki
    Sakurai, Kouichi
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023,
  • [7] Tracing Malicious Insider in Attribute-Based Cloud Data Sharing
    Ning J.-T.
    Huang X.-Y.
    Wei L.-F.
    Ma J.-H.
    Rong J.
    Jisuanji Xuebao/Chinese Journal of Computers, 2022, 45 (07): : 1431 - 1445
  • [8] Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups
    Li, Xiaoyi
    Liang, Kaitai
    Liu, Zhen
    Wong, Duncan
    CLOSER: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2017, : 281 - 292
  • [9] Auditable Attribute-Based Credentials Scheme and Its Application in Contact Tracing
    Wang, Pengfei
    Su, Xiangyu
    Larangeira, Mario
    Tanaka, Keisuke
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT I, 2024, 14583 : 88 - 118
  • [10] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +