TY - JOUR
T1 - Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service
AU - Yu, Gang
AU - Wang, Yongjuan
AU - Cao, Zhenfu
AU - Lin, Jian
AU - Wang, Xiangyu
N1 - Publisher Copyright:
© The Author(s) 2019.
PY - 2019/4/1
Y1 - 2019/4/1
N2 - Ciphertext-policy attribute-based encryption is a promising mechanism with fine-grained access control for cloud storage system. However, there is a long-lasting problem of key abuse that a user may share its decryption key and a semi-honest authority may illegally issue decryption keys for unauthorized users for profits. To address this problem, we propose an accountable ciphertext-policy attribute-based encryption scheme. In our construction, there are two authorities to issue keys for users, but they cannot decrypt any ciphertexts without collusion. A shared key can be effectively traced, and if the traced identity claims that it is innocent, an auditor can publicly audit who will be responsible for the shared key. Compared with existing accountable ciphertext-policy attribute-based encryption schemes, the proposed scheme is more practical from the two aspects: (1) a user can normally request for a decryption key along with a short signature, and no additional interaction between users and authorities is needed; and (2) the complexity of tracing a masked secret key is reduced to |u| exponent computation, where |u| denotes the number of users in the system. At last, we give the security and experimental analysis.
AB - Ciphertext-policy attribute-based encryption is a promising mechanism with fine-grained access control for cloud storage system. However, there is a long-lasting problem of key abuse that a user may share its decryption key and a semi-honest authority may illegally issue decryption keys for unauthorized users for profits. To address this problem, we propose an accountable ciphertext-policy attribute-based encryption scheme. In our construction, there are two authorities to issue keys for users, but they cannot decrypt any ciphertexts without collusion. A shared key can be effectively traced, and if the traced identity claims that it is innocent, an auditor can publicly audit who will be responsible for the shared key. Compared with existing accountable ciphertext-policy attribute-based encryption schemes, the proposed scheme is more practical from the two aspects: (1) a user can normally request for a decryption key along with a short signature, and no additional interaction between users and authorities is needed; and (2) the complexity of tracing a masked secret key is reduced to |u| exponent computation, where |u| denotes the number of users in the system. At last, we give the security and experimental analysis.
KW - Ciphertext-policy attribute-based encryption
KW - accountability
KW - cloud computing
KW - key escrow
KW - traceability
UR - https://www.scopus.com/pages/publications/85063992829
U2 - 10.1177/1550147719841276
DO - 10.1177/1550147719841276
M3 - 文章
AN - SCOPUS:85063992829
SN - 1550-1329
VL - 15
JO - International Journal of Distributed Sensor Networks
JF - International Journal of Distributed Sensor Networks
IS - 4
ER -