TY - GEN
T1 - Fully collusion-resistant traceable key-policy attribute-based encryption with sub-linear size ciphertexts
AU - Liu, Zhen
AU - Cao, Zhenfu
AU - Wong, Duncan S.
N1 - Publisher Copyright:
© Springer International Publishing Switzerland 2015.
PY - 2015
Y1 - 2015
N2 - Recently a series of expressive, secure and efficient Attribute- Based Encryption (ABE)schemes, both inkey-policy flavour and ciphertext-policy flavor, have been proposed. However, before being applied into practice, these systems have to attain traceability of malicious users. As the decryption privilege of a decryption key in Key-Policy ABE (resp. Ciphertext-Policy ABE) may be shared by multiple users who own the same access policy (resp. attribute set), malicious users might tempt to leak their decryption privileges to third parties, for financial gain as an example, if there is no tracing mechanism for tracking them down. In this work we study the traceability notion in the setting of Key-Policy ABE, and formalize Key-Policy ABE supporting fully collusion-resistant black-box traceability. An adversary is allowed to access an arbitrary number of keys of its own choice when building a decryption-device, and given such a decryption-device while the underlying decryption algorithm or key may not be given, a black-box tracing algorithm can find out at least one of the malicious users whose keys have been used for building the decryption-device. We propose a construction, which supports both fully collusion-resistant black-box traceability and high expressivity (i.e. supporting any monotonic access structures). The construction is fully secure in the standard model (i.e. it achieves the best security level that the conventional non-traceable ABE systems do to date), and is efficient that the fully collusion-resistant black-box traceability is attained at the price of making ciphertexts grow only sub-linearly in the number of users in the system, which is the most efficient level to date.
AB - Recently a series of expressive, secure and efficient Attribute- Based Encryption (ABE)schemes, both inkey-policy flavour and ciphertext-policy flavor, have been proposed. However, before being applied into practice, these systems have to attain traceability of malicious users. As the decryption privilege of a decryption key in Key-Policy ABE (resp. Ciphertext-Policy ABE) may be shared by multiple users who own the same access policy (resp. attribute set), malicious users might tempt to leak their decryption privileges to third parties, for financial gain as an example, if there is no tracing mechanism for tracking them down. In this work we study the traceability notion in the setting of Key-Policy ABE, and formalize Key-Policy ABE supporting fully collusion-resistant black-box traceability. An adversary is allowed to access an arbitrary number of keys of its own choice when building a decryption-device, and given such a decryption-device while the underlying decryption algorithm or key may not be given, a black-box tracing algorithm can find out at least one of the malicious users whose keys have been used for building the decryption-device. We propose a construction, which supports both fully collusion-resistant black-box traceability and high expressivity (i.e. supporting any monotonic access structures). The construction is fully secure in the standard model (i.e. it achieves the best security level that the conventional non-traceable ABE systems do to date), and is efficient that the fully collusion-resistant black-box traceability is attained at the price of making ciphertexts grow only sub-linearly in the number of users in the system, which is the most efficient level to date.
KW - Attribute-based encryption
KW - Blackbox traceability
KW - Efficiency
KW - Key-policy
UR - https://www.scopus.com/pages/publications/84926352556
U2 - 10.1007/978-3-319-16745-9_22
DO - 10.1007/978-3-319-16745-9_22
M3 - 会议稿件
AN - SCOPUS:84926352556
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 403
EP - 423
BT - Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Revised Selected Papers
A2 - Lin, Dongdai
A2 - Zhou, Jianying
A2 - Yung, Moti
PB - Springer Verlag
T2 - 10th International Conference on Information Security and Cryptology, Inscrypt 2014
Y2 - 13 December 2014 through 15 December 2014
ER -