Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption

被引:121
|
作者
Han, Jinguang [1 ]
Susilo, Willy [2 ]
Mu, Yi [2 ]
Zhou, Jianying [3 ]
Au, Man Ho Allen [4 ]
机构
[1] Nanjing Univ Finance & Econ, Jiangsu Prov Key Lab E Business, Nanjing 210003, Jiangsu, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
[3] Inst Infocomm Res, Dept Infocomm Secur, Singapore 138632, Singapore
[4] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
CP-ABE; decentralization; privacy; IDENTITY-BASED ENCRYPTION; MULTI-AUTHORITY; EFFICIENT; BLIND;
D O I
10.1109/TIFS.2014.2382297
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In previous privacy-preserving multiauthority attribute-based encryption (PPMA-ABE) schemes, a user can acquire secret keys from multiple authorities with them knowing his/her attributes and furthermore, a central authority is required. Notably, a user's identity information can be extracted from his/her some sensitive attributes. Hence, existing PPMA-ABE schemes cannot fully protect users' privacy as multiple authorities can collaborate to identify a user by collecting and analyzing his attributes. Moreover, ciphertext-policy ABE (CP-ABE) is a more efficient public-key encryption, where the encryptor can select flexible access structures to encrypt messages. Therefore, a challenging and important work is to construct a PPMA-ABE scheme where there is no necessity of having the central authority and furthermore, both the identifiers and the attributes can be protected to be known by the authorities. In this paper, a privacy-preserving decentralized CP-ABE (PPDCP-ABE) is proposed to reduce the trust on the central authority and protect users' privacy. In our PPDCP-ABE scheme, each authority can work independently without any collaboration to initial the system and issue secret keys to users. Furthermore, a user can obtain secret keys from multiple authorities without them knowing anything about his global identifier and attributes.
引用
收藏
页码:665 / 678
页数:14
相关论文
共 50 条
  • [41] Efficient ciphertext-policy attribute-based encryption with blackbox traceability
    Xu, Shengmin
    Yuan, Jiaming
    Xu, Guowen
    Li, Yingjiu
    Liu, Ximeng
    Zhang, Yinghui
    Ying, Zuobin
    [J]. INFORMATION SCIENCES, 2020, 538 : 19 - 38
  • [42] Adaptively secure outsourcing ciphertext-policy attribute-based encryption
    Wang, Hao
    Zheng, Zhihua
    Wu, Lei
    Wang, Yilei
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2270 - 2280
  • [43] An Efficient Ciphertext-policy Attribute-based Encryption on Ideal Lattices
    Zhao Jian
    Gao Haiying
    Hu Bin
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (07) : 1652 - 1660
  • [44] Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
    Shijie Deng
    Gaobo Yang
    Wen Dong
    Ming Xia
    [J]. Multimedia Tools and Applications, 2023, 82 : 22251 - 22274
  • [45] A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update
    Liu, Zhe
    Wang, Fuqun
    Chen, Kefei
    Tang, Fei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [46] Outsourced ciphertext-policy attribute-based encryption with partial policy hidden
    Yu, Jinxia
    He, Guanghui
    Yan, Xixi
    Tang, Yongli
    Qin, Rongxia
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (05)
  • [47] Dynamic Ciphertext-Policy Attribute-Based Encryption for Expressive Access Policy
    Rao, Y. Sreenivasa
    Dutta, Ratna
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2014, 2014, 8337 : 275 - 286
  • [48] Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
    Deng, Hua
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    Zhang, Lei
    Liu, Jianwei
    Shi, Wenchang
    [J]. INFORMATION SCIENCES, 2014, 275 : 370 - 384
  • [49] Optimized Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation
    Li, Yang
    Zhu, Jianming
    Wang, Xiuli
    Chai, Yanmei
    Shao, Shuai
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 385 - 394
  • [50] New Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation
    Zu, Longhui
    Liu, Zhenhua
    Li, Juanjuan
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 281 - 287