Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption

被引:0
|
作者
Du, Jiajie [1 ]
HelIl, Nurmamat [1 ]
机构
[1] Xinjiang Univ, Coll Math & Syst Sci, Urumqi 830046, Peoples R China
基金
中国国家自然科学基金;
关键词
CP-ABE; permission delegation; key delegation; minimal attribute set; white-box traceability; CP-ABE; ANTENNA; METAMATERIAL;
D O I
10.3837/tiis.2021.09.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Permission delegation is an important research issue in access control. It allows a user to delegate some of his permissions to others to reduce his workload, or enables others to complete some tasks on his behalf when he is unavailable to do so. As an ideal solution for controlling read access on outsourced data objects on the cloud, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has attracted much attention. Some existing CP-ABE schemes handle the read permission delegation through the delegation of the user's private key to others. Still, these schemes lack the further consideration of granularity and traceability of the permission delegation. To this end, this article proposes a flexible and fine-grained CP-ABE key delegation approach that supports white-box traceability. In this approach, the key delegator first examines the relations between the data objects, read permission thereof that he intends to delegate, and the attributes associated with the access policies of these data objects. Then he chooses a minimal attribute set from his attributes according to the principle of least privilege. He constructs the delegation key with the minimal attribute set. Thus, we can achieve the shortest delegation key and minimize the time of key delegation under the premise of guaranteeing the delegator's access control requirement. The Key Generation Center (KGC) then embeds the delegatee's identity into the key to trace the route of the delegation key. Our approach prevents the delegatee from combining his existing key with the new delegation key to access unauthorized data objects. Theoretical analysis and test results show that our approach helps the KGC transfer some of its burdensome key generation tasks to regular users (delegators) to accommodate more users.
引用
收藏
页码:3274 / 3297
页数:24
相关论文
共 50 条
  • [1] Fine-grained user access control in ciphertext-policy attribute-based encryption
    Hur, Junbeom
    Park, Chanil
    Hwang, Seong Oun
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (03) : 253 - 261
  • [2] Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance
    Jiang, Yinhao
    Susilo, Willy
    Mu, Yi
    Guo, Fuchun
    [J]. INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 477 - 494
  • [3] Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
    Shijie Deng
    Gaobo Yang
    Wen Dong
    Ming Xia
    [J]. Multimedia Tools and Applications, 2023, 82 : 22251 - 22274
  • [4] Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
    Deng, Shijie
    Yang, Gaobo
    Dong, Wen
    Xia, Ming
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (14) : 22251 - 22274
  • [5] Traceable-then-revocable ciphertext-policy attribute-based encryption scheme
    Liu, Zhenhua
    Duan, Shuhong
    Zhou, Peilin
    Wang, Baocang
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 903 - 913
  • [6] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [7] Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing
    Jiang, Yinhao
    Susilo, Willy
    Mu, Yi
    Guo, Fuchun
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 720 - 729
  • [8] Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service
    Yu, Gang
    Wang, Yongjuan
    Cao, Zhenfu
    Lin, Jian
    Wang, Xiangyu
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04):
  • [9] Comments on "Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation"
    Xiong, Hu
    Wang, Qiang
    Sun, Jianfei
    [J]. INFORMATION PROCESSING LETTERS, 2017, 127 : 67 - 70
  • [10] Ciphertext-policy attribute-based delay encryption
    Chen, Lijiao
    Lv, Kewei
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (02) : 167 - 185