Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud

被引:54
|
作者
Ning, Jianting [1 ]
Dong, Xiaolei [2 ]
Cao, Zhenfu [2 ]
Wei, Lifei [3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] E China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[3] Shanghai Ocean Univ, Coll Informat Technol, Shanghai 201306, Peoples R China
来源
关键词
Attribute-based encryption; Ciphertext-policy; Key abuse; White-box traceablity; Public auditing;
D O I
10.1007/978-3-319-24177-7_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a sophisticated mechanism for secure fine-grained access control, ciphertext-policy attribute-based encryption (CP-ABE) is a highly promising solution for commercial applications such as cloud computing. However, there still exists one major issue awaiting to be solved, that is, the prevention of key abuse. Most of the existing CP-ABE systems missed this critical functionality, hindering the wide utilization and commercial application of CP-ABE systems to date. In this paper, we address two practical problems about the key abuse of CP-ABE: (1) The key escrow problem of the semi-trusted authority; and, (2) The malicious key delegation problem of the users. For the semi-trusted authority, its misbehavior (i.e., illegal key (re-) distribution) should be caught and prosecuted. And for a user, his/her malicious behavior (i.e., illegal key sharing) need be traced. We affirmatively solve these two key abuse problems by proposing the first accountable authority CP-ABE with white-box traceability that supports policies expressed in any monotone access structures. Moreover, we provide an auditor to judge publicly whether a suspected user is guilty or is framed by the authority.
引用
收藏
页码:270 / 289
页数:20
相关论文
共 50 条
  • [1] Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
    Ning, Jianting
    Cao, Zhenfu
    Dong, Xiaolei
    Wei, Lifei
    Lin, Xiaodong
    [J]. COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 55 - 72
  • [2] Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability
    Kai Zhang
    Hui Li
    Jianfeng Ma
    Ximeng Liu
    [J]. Science China Information Sciences, 2018, 61
  • [3] Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability
    Kai ZHANG
    Hui LI
    Jianfeng MA
    Ximeng LIU
    [J]. Science China(Information Sciences), 2018, 61 (03) : 16 - 28
  • [4] Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability
    Zhang, Kai
    Li, Hui
    Ma, Jianfeng
    Liu, Ximeng
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
  • [5] White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes
    Ning, Jianting
    Dong, Xiaolei
    Cao, Zhenfu
    Wei, Lifei
    Lin, Xiaodong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (06) : 1274 - 1288
  • [6] White-Box Traceable Ciphertext-Policy Attribute-Based Encryption in Multi-Domain Environment
    Yan, Xixi
    He, Xu
    Yu, Jinxia
    Tang, Yongli
    [J]. IEEE Access, 2019, 7 : 128298 - 128312
  • [7] White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures
    Liu, Zhen
    Cao, Zhenfu
    Wong, Duncan S.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (01) : 76 - 88
  • [8] Efficient ciphertext-policy attribute-based encryption with blackbox traceability
    Xu, Shengmin
    Yuan, Jiaming
    Xu, Guowen
    Li, Yingjiu
    Liu, Ximeng
    Zhang, Yinghui
    Ying, Zuobin
    [J]. INFORMATION SCIENCES, 2020, 538 : 19 - 38
  • [9] ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    [J]. BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, 2009, 46 (04) : 803 - 819
  • [10] Ciphertext-policy attribute-based encryption scheme with verifiability on authority
    Yu, Jinxia
    He, Xu
    Yan, Xixi
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (04): : 49 - 57