Traceable Ciphertet-Policy Attribute-Based Encryption with Constant Decryption

被引:2
|
作者
Wang, Guangbo [1 ]
Li, Feng [1 ]
Wang, Pengcheng [1 ]
Hu, Yixiao [1 ]
机构
[1] Beijing Sci & Technol Informat Res Ctr, Beijing 100036, Peoples R China
关键词
ciphertext-policy; traceability; constant decryption; CP-ABE; SECRET KEYS; DEVICES;
D O I
10.3837/tiis.2021.09.017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We provide a traceable ciphertext-policy attribute based encryption (CP-ABE) construction for monotone access structures (MAS) based on composite order bilinear groups, which is secure adaptively under the standard model. We construct this scheme by making use of an "encoding technique" which represents the MAS by their minimal sets to encrypt the messages. To date, for all traceable CP-ABE schemes, their encryption costs grow linearly with the MAS size, the decryption costs grow linearly with the qualified rows in the span programs. However, in our traceable CP-ABE, the ciphertext is linear with the minimal sets, and decryption needs merely three bilinear pairing computations and two exponent computations, which improves the efficiency extremely and has constant decryption. At last, the detailed security and traceability proof is given.
引用
收藏
页码:3401 / 3420
页数:20
相关论文
共 50 条
  • [41] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
    Emura, Keita
    Miyaji, Atsuko
    Nomura, Akito
    Omote, Kazumasa
    Soshi, Masakazu
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 13 - +
  • [42] Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption
    Mao, Xianping
    Lai, Junzuo
    Mei, Qixiang
    Chen, Kefei
    Weng, Jian
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (05) : 533 - 546
  • [43] Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing
    Qin, Baodong
    Zheng, Dong
    [J]. IEEE ACCESS, 2019, 7 : 42331 - 42342
  • [44] Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV
    Feng, Chaosheng
    Yu, Keping
    Aloqaily, Moayad
    Alazab, Mamoun
    Lv, Zhihan
    Mumtaz, Shahid
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (11) : 13784 - 13795
  • [45] Dual Traceable Distributed Attribute-Based Searchable Encryption and Ownership Transfer
    Yang, Yang
    Deng, Robert H.
    Guo, Wenzhong
    Cheng, Hongju
    Luo, Xiangyang
    Zheng, Xianghan
    Rong, Chunming
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 247 - 262
  • [46] A Traceable and Revocable Multiauthority Attribute-Based Encryption Scheme with Fast Access
    Zhang, Kai
    Li, Yanping
    Song, Yun
    Lu, Laifeng
    Zhang, Tao
    Jiang, Qi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [47] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [48] Generic Construction of Black-Box Traceable Attribute-Based Encryption
    Luo, Fucai
    Al-Kuwari, Saif
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 942 - 955
  • [49] Traceable Attribute-Based Encryption Scheme Using BIM Collaborative Design
    Liu, Jie
    Xiang, Guangli
    Li, Chengde
    Xie, Weiping
    [J]. BUILDINGS, 2024, 14 (03)
  • [50] Efficient and privacy-preserving traceable attribute-based encryption in blockchain
    Axin Wu
    Yinghui Zhang
    Xiaokun Zheng
    Rui Guo
    Qinglan Zhao
    Dong Zheng
    [J]. Annals of Telecommunications, 2019, 74 : 401 - 411