Attribute-Based Traitor Tracing

被引:2
|
作者
Wang, Yong-Tao [1 ]
Chen, Ke-Fei [1 ,2 ]
Chen, Jian-Hong [1 ,3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Natl Lab Modern Commun, Chengdu 610041, Peoples R China
[3] Huaiyin Inst Technol, Huaian 223003, Peoples R China
基金
中国国家自然科学基金;
关键词
attribute-based encryption; traitor tracing; access rights; collusion; decryption device; IDENTITY-BASED ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we focus on traitor tracing scheme in attribute-based encryption (ABE) scenarios. A well-known concern in the setting of attribute-based encryption is that a user (or set of colluding users) can create a new key (or decryption device) by using his legal one and distribute it for malicious use. To mitigate this problem, we introduce the notion of attribute-based traitor tracing (ABTT). We formalize the definitions and security notions for attribute-based traitor tracing scheme, and then present a construction of AB-TT. Our scheme makes use of the identity-based traitor tracing technology proposed by Abdalla et al., and is based on the second construction of Sahai-Waters' attribute-based encryption schemes, but in the asymmetric bilinear setting. Our scheme is shown to be secure in the standard model under some reasonable assumptions. To the best of our knowledge, this is the first ABTT scheme up to now.
引用
收藏
页码:181 / 195
页数:15
相关论文
共 50 条
  • [41] A traitor tracing scheme based on the RSA scheme
    Yang Bo
    Mao Jane
    Zhu Shenglin
    TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 625 - +
  • [42] Traitor tracing for subscription-based systems
    Jin, Hongxia
    Lotspiech, Jeffory
    Blaum, Mario
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 223 - +
  • [43] Attribute attribute-based clustering for product family design
    Ye, Xiaoli
    Gershenson, John K.
    19TH INTERNATIONAL CONFERENCE ON DESIGN THEORY AND METHODOLOGY/1ST INTERNATIONAL CONFERENCE ON MICRO AND NANO SYSTEMS, VOL 3, PART A AND B, 2008, : 353 - 361
  • [44] A traitor tracing scheme based on the RSA system
    Yang, Bo
    Ma, Hua
    Zhu, Shenglin
    International Journal of Network Security, 2007, 5 (02) : 182 - 186
  • [45] Efficient traitor tracing scheme based on NTRU
    Lv, XX
    Yang, B
    Pei, CX
    PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 120 - 124
  • [46] Hybrid traitor tracing
    Jin, Hongxia
    Lotspiech, Jeffery
    2006 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO - ICME 2006, VOLS 1-5, PROCEEDINGS, 2006, : 1329 - +
  • [47] Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation
    Gao J.
    Sun J.
    Qin J.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2160 - 2169
  • [48] Dynamic Traitor Tracing
    Amos Fiat
    Tamir Tassa
    Journal of Cryptology, 2001, 14 : 211 - 223
  • [49] Dynamic traitor tracing
    Fiat, A
    Tassa, T
    JOURNAL OF CRYPTOLOGY, 2001, 14 (03) : 211 - 223
  • [50] A new traitor tracing
    Mitsunari, S
    Sakai, R
    Kasahara, M
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2002, E85A (02) : 481 - 484