Attribute-Based Traitor Tracing

被引:2
|
作者
Wang, Yong-Tao [1 ]
Chen, Ke-Fei [1 ,2 ]
Chen, Jian-Hong [1 ,3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Natl Lab Modern Commun, Chengdu 610041, Peoples R China
[3] Huaiyin Inst Technol, Huaian 223003, Peoples R China
基金
中国国家自然科学基金;
关键词
attribute-based encryption; traitor tracing; access rights; collusion; decryption device; IDENTITY-BASED ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we focus on traitor tracing scheme in attribute-based encryption (ABE) scenarios. A well-known concern in the setting of attribute-based encryption is that a user (or set of colluding users) can create a new key (or decryption device) by using his legal one and distribute it for malicious use. To mitigate this problem, we introduce the notion of attribute-based traitor tracing (ABTT). We formalize the definitions and security notions for attribute-based traitor tracing scheme, and then present a construction of AB-TT. Our scheme makes use of the identity-based traitor tracing technology proposed by Abdalla et al., and is based on the second construction of Sahai-Waters' attribute-based encryption schemes, but in the asymmetric bilinear setting. Our scheme is shown to be secure in the standard model under some reasonable assumptions. To the best of our knowledge, this is the first ABTT scheme up to now.
引用
收藏
页码:181 / 195
页数:15
相关论文
共 50 条
  • [31] Attribute-Based Encryption for Circuits
    Gorbunov, Sergey
    Vaikuntanathan, Vinod
    Wee, Hoeteck
    JOURNAL OF THE ACM, 2015, 62 (06)
  • [32] Threshold Attribute-Based Signcryption
    Gagne, Martin
    Narayan, Shivaramakrishnan
    Safavi-Naini, Reihaneh
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 154 - 171
  • [33] Decentralized Attribute-Based Signatures
    Okamoto, Tatsuaki
    Takashima, Katsuyuki
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 125 - 142
  • [34] Hierarchical Attribute-Based Signatures
    Dragan, Constantin-Catalin
    Gardham, Daniel
    Manulis, Mark
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2018, 2018, 11124 : 213 - 234
  • [35] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    COMPUTER, 2015, 48 (02) : 85 - 88
  • [36] Attribute-based signatures on lattices
    Xie Jia
    Hu Yupu
    Gao Juntao
    Gao Wen
    Li Xuelian
    The Journal of China Universities of Posts and Telecommunications, 2016, 23 (04) : 83 - 90
  • [37] Attribute-Based Signature on Lattices
    毛贤平
    陈克非
    龙宇
    王亮亮
    JournalofShanghaiJiaotongUniversity(Science), 2014, 19 (04) : 406 - 411
  • [38] Distributed Attribute-Based Encryption
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 20 - 36
  • [39] A Calculus for Attribute-based Communication
    Abd Alrahman, Yehia
    De Nicola, Rocco
    Loreti, Michele
    Tiezzi, Francesco
    Vigo, Roberto
    30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, 2015, : 1840 - 1845
  • [40] Traceable attribute-based signcryption
    Wei, Jianghong
    Hu, Xuexian
    Liu, Wenfen
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2302 - 2317