Generic Codes Based Traitor Tracing and Revoking Scheme from Attribute-Based Encryption

被引:6
|
作者
Zhao, Xingwen [1 ]
Zhao, Gaofei [1 ]
Li, Hui [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
Broadcast encryption; traitor tracing; attributebased encryption; collusion secure codes; identifiable parent property codes; PIRATE EVOLUTION; SECURE; TRACEABILITY;
D O I
10.1109/CIT.2014.70
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In broadcast encryption system, traitor tracing is helpful to find out the traitors who give out their decryption keys to construct pirate decoders. Many codes based traitor tracing schemes were proposed. However, there is no work that shows the connections between attribute-based encryption schemes and codes based tracing and revoking schemes. We describe a generic codes based tracing and revoking scheme, based on ciphertextpolicy attribute-based encryption with expressive access policies consisted of multiple AND-gates and OR-gates. Our method shows how to embed collusion secure codes into the selected attribute-based encryption scheme to construct a tracing and revoking system. Each bit of collusion secure codes is treated as an attribute and assigned to the corresponding users. The codeword of the pirate decoder is recovered by testing its decrypting ability, and then at least one of the traitors can be identified. Our method can be extended to adopt other codes such as identifiable parent property (IPP) codes.
引用
收藏
页码:299 / 306
页数:8
相关论文
共 50 条
  • [1] An attribute-based encryption scheme for traitor tracing and revocation together
    Ma, Hai-Ying
    Zeng, Guo-Sun
    Jisuanji Xuebao/Chinese Journal of Computers, 2012, 35 (09): : 1845 - 1855
  • [2] Attribute-Based Traitor Tracing
    Wang, Yong-Tao
    Chen, Ke-Fei
    Chen, Jian-Hong
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (01) : 181 - 195
  • [3] Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large UniverseaEuro
    Liu, Zhen
    Wong, Duncan S.
    COMPUTER JOURNAL, 2016, 59 (07): : 983 - 1004
  • [4] Traitor-Tracing from LWE Made Simple and Attribute-Based
    Chen, Yilei
    Vaikuntanathan, Vinod
    Waters, Brent
    Wee, Hoeteck
    Wichs, Daniel
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT II, 2018, 11240 : 341 - 369
  • [5] Attribute-based Encryption Scheme with Fast Encryption
    一种支持快速加密的基于属性加密方案
    Feng, Chao-Sheng (csfenggy@126.com), 1600, Chinese Academy of Sciences (31): : 3923 - 3936
  • [6] Attribute-Based Encryption Scheme Based on SIFF
    Zhao, Tianyu
    Wei, Lingbo
    Zhang, Chi
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [7] A Hierarchical Attribute-Based Encryption Scheme
    ZOU Xiubin
    Wuhan University Journal of Natural Sciences, 2013, 18 (03) : 259 - 264
  • [8] Secured tracing for group signatures from attribute-based encryption
    Perera, Maharage Nisansala Sevwandi
    Matsunaka, Takashi
    Yokoyama, Hiroyuki
    Sakurai, Kouichi
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023,
  • [9] An Attribute-Based Encryption Scheme Based on Unrecognizable Trapdoors
    Ruizhong Du
    Ailun Tan
    Junfeng Tian
    Tsinghua Science and Technology, 2020, 25 (05) : 579 - 588
  • [10] An Attribute-Based Encryption Scheme Based on Unrecognizable Trapdoors
    Du, Ruizhong
    Tan, Ailun
    Tian, Junfeng
    TSINGHUA SCIENCE AND TECHNOLOGY, 2020, 25 (05) : 579 - 588