Attribute-Based Traitor Tracing

被引:2
|
作者
Wang, Yong-Tao [1 ]
Chen, Ke-Fei [1 ,2 ]
Chen, Jian-Hong [1 ,3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Natl Lab Modern Commun, Chengdu 610041, Peoples R China
[3] Huaiyin Inst Technol, Huaian 223003, Peoples R China
基金
中国国家自然科学基金;
关键词
attribute-based encryption; traitor tracing; access rights; collusion; decryption device; IDENTITY-BASED ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we focus on traitor tracing scheme in attribute-based encryption (ABE) scenarios. A well-known concern in the setting of attribute-based encryption is that a user (or set of colluding users) can create a new key (or decryption device) by using his legal one and distribute it for malicious use. To mitigate this problem, we introduce the notion of attribute-based traitor tracing (ABTT). We formalize the definitions and security notions for attribute-based traitor tracing scheme, and then present a construction of AB-TT. Our scheme makes use of the identity-based traitor tracing technology proposed by Abdalla et al., and is based on the second construction of Sahai-Waters' attribute-based encryption schemes, but in the asymmetric bilinear setting. Our scheme is shown to be secure in the standard model under some reasonable assumptions. To the best of our knowledge, this is the first ABTT scheme up to now.
引用
收藏
页码:181 / 195
页数:15
相关论文
共 50 条
  • [21] A survey on Attribute-Based Signatures
    Oberko, Prince Silas Kwesi
    Obeng, Victor-Hillary Kofi Setornyo
    Xiong, Hu
    Kumari, Saru
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 124
  • [22] On the Power of Attribute-Based Communication
    Abd Alrahman, Yehia
    De Nicola, Rocco
    Loreti, Michele
    FORMAL TECHNIQUES FOR DISTRIBUTED OBJECTS, COMPONENTS, AND SYSTEMS (FORTE 2016), 2016, 9688 : 1 - 18
  • [23] Decentralizing Attribute-Based Encryption
    Lewko, Allison
    Waters, Brent
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 568 - 588
  • [24] Registered Attribute-Based Encryption
    Hohenberger, Susan
    Lu, George
    Waters, Brent
    Wu, David J.
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT III, 2023, 14006 : 511 - 542
  • [25] Attribute-based signatures on lattices
    Jia, Xie (xiejia199325@163.com), 2016, Beijing University of Posts and Telecommunications (23):
  • [26] Attribute-based signatures on lattices
    Xie Jia
    Hu Yupu
    Gao Juntao
    Gao Wen
    Li Xuelian
    The Journal of China Universities of Posts and Telecommunications, 2016, (04) : 83 - 90
  • [27] Traceable attribute-based signature
    Gu, Ke
    Wang, Keming
    Yang, Lulu
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 49
  • [28] Secure attribute-based systems
    Pirretti, Matthew
    Traynor, Patrick
    McDaniel, Patrick
    Waters, Brent
    JOURNAL OF COMPUTER SECURITY, 2010, 18 (05) : 799 - 837
  • [29] Registered Attribute-Based Signature
    Zhang, Yijian
    Zhao, Jun
    Zhu, Ziqi
    Gong, Junqing
    Chen, Jie
    PUBLIC-KEY CRYPTOGRAPHY, PT I, PKC 2024, 2024, 14601 : 133 - 162
  • [30] Attribute-based signature on lattices
    Mao X.-P.
    Chen K.-F.
    Long Y.
    Wang L.-L.
    Journal of Shanghai Jiaotong University (Science), 2014, 19 (4) : 406 - 411