TY - GEN
T1 - Accountable ciphertext-policy attribute-based encryption scheme supporting public verifiability and nonrepudiation
AU - Yu, Gang
AU - Cao, Zhenfu
AU - Zeng, Guang
AU - Han, Wenbao
N1 - Publisher Copyright:
© Springer International Publishing AG 2016.
PY - 2016
Y1 - 2016
N2 - Ciphertext-policy attribute-based encryption, denoted by CP-ABE, is a promising extension of identity-based encryption which enables fine-grained data access control by taking a set of attributes as users’ public key. However, owing to the fact that an attribute set may be shared by multiple users, malicious users dare to share their decryption keys to others for profits. Furthermore, the central authority is able to issue arbitrary decryption keys for any unauthorized users. To prevent these two kinds of key abuses in CP-ABE system, we propose an accountable CP-ABE scheme which allows any third party to publicly verify the identity embedded in a leaked decryption key, allows an auditor to publicly check whether a malicious user or the authority should be responsible for an exposed decryption key, and the malicious user or the authority can’t deny it. The proposed accountable CP-ABE scheme supports any LSSS realizable access structures. At last, the confidentiality and public verifiability of the proposed scheme can be proved to be tightly related to the atomic CP-ABE scheme and the signature scheme that it composed from.
AB - Ciphertext-policy attribute-based encryption, denoted by CP-ABE, is a promising extension of identity-based encryption which enables fine-grained data access control by taking a set of attributes as users’ public key. However, owing to the fact that an attribute set may be shared by multiple users, malicious users dare to share their decryption keys to others for profits. Furthermore, the central authority is able to issue arbitrary decryption keys for any unauthorized users. To prevent these two kinds of key abuses in CP-ABE system, we propose an accountable CP-ABE scheme which allows any third party to publicly verify the identity embedded in a leaked decryption key, allows an auditor to publicly check whether a malicious user or the authority should be responsible for an exposed decryption key, and the malicious user or the authority can’t deny it. The proposed accountable CP-ABE scheme supports any LSSS realizable access structures. At last, the confidentiality and public verifiability of the proposed scheme can be proved to be tightly related to the atomic CP-ABE scheme and the signature scheme that it composed from.
KW - Accountability
KW - Attribute-based encryption
KW - Key abuse
KW - White-box traceability
UR - https://www.scopus.com/pages/publications/84996483755
U2 - 10.1007/978-3-319-47422-9_1
DO - 10.1007/978-3-319-47422-9_1
M3 - 会议稿件
AN - SCOPUS:84996483755
SN - 9783319474212
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 3
EP - 18
BT - Provable Security - 10th International Conference, ProvSec 2016, Proceedings
A2 - Chen, Liqun
A2 - Han, Jinguang
PB - Springer Verlag
T2 - 10th International Conference on Provable Security, ProvSec 2016
Y2 - 10 November 2016 through 11 November 2016
ER -