Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud

Jianting Ning, Xiaolei Dong*, Zhenfu Cao, Lifei Wei

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

76 Scopus citations

Abstract

As a sophisticated mechanism for secure fine-grained access control, ciphertext-policy attribute-based encryption (CP-ABE) is a highly promising solution for commercial applications such as cloud computing. However, there still exists one major issue awaiting to be solved, that is, the prevention of key abuse. Most of the existing CP-ABE systems missed this critical functionality, hindering the wide utilization and commercial application of CP-ABE systems to date. In this paper, we address two practical problems about the key abuse of CP-ABE: (1) The key escrow problem of the semi-trusted authority; and, (2) The malicious key delegation problem of the users. For the semi-trusted authority, its misbehavior (i.e., illegal key (re-)distribution) should be caught and prosecuted. And for a user, his/her malicious behavior (i.e., illegal key sharing) need be traced. We affirmatively solve these two key abuse problems by proposing the first accountable authority CP-ABE with white-box traceability that supports policies expressed in any monotone access structures. Moreover, we provide an auditor to judge publicly whether a suspected user is guilty or is framed by the authority.

Original languageEnglish
Title of host publicationComputer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings
EditorsGünther Pernul, Peter Y.A. Ryan, Edgar Weippl
PublisherSpringer Verlag
Pages270-289
Number of pages20
ISBN (Print)9783319241760
DOIs
StatePublished - 2015
Event20th European Symposium on Research in Computer Security, ESORICS 2015 - Vienna, Austria
Duration: 21 Sep 201525 Sep 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9327
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference20th European Symposium on Research in Computer Security, ESORICS 2015
Country/TerritoryAustria
CityVienna
Period21/09/1525/09/15

Keywords

  • Attribute-based encryption
  • Ciphertext-policy
  • Key abuse
  • Public auditing
  • White-box traceablity

Fingerprint

Dive into the research topics of 'Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud'. Together they form a unique fingerprint.

Cite this