scispace - formally typeset
Open AccessJournal ArticleDOI

Black-Box and Public Traceability in Multi-authority Attribute Based Encryption

Qianqian Zhao, +4 more
- 01 Jan 2020 - 
- Vol. 29, Iss: 1, pp 106-113
TLDR
This work proposes a new multiauthority CP-ABE with blackbox and public traceability, where the private keys are assigned by the cooperation between one central authority and multi-authorities, and indicates that the proposed scheme is highly efficient and provably secure under the security model.
Abstract
Ciphertext-policy Attribute-based encryption (CP-ABE) is a promising tool for implementing finegrained cryptographic access control. While the uniqueness of generating private keys brings extra security issues. The key escrow is inherent in CP-ABE systems because the trusted authority has the power to decrypt every ciphertext. The private keys are only associated with the attributes nor the user's identity. Some malicious users might be tempted to leak their decryption privileges for financial gain without the risk of being caught as the decryption privilege could be shared by multiple users who own the same set of attributes. We propose a new multiauthority CP-ABE with blackbox and public traceability, where the private keys are assigned by the cooperation between one central authority and multi-authorities. The performance and security analyses indicate that the proposed scheme is highly efficient and provably secure under the security model.

read more

Citations
More filters
Journal ArticleDOI

P2HBT: Partially Policy Hidden E-Healthcare System with Black-Box Traceability

TL;DR: Wang et al. as mentioned in this paper proposed an effective traceable and robust data security mechanism for Electronic Health Record (EHR), which can perform fine-grained access control on encrypted EHRs, prevent the leakage of privacy contained in access policies and support tracing of traitors.
Journal ArticleDOI

An enhanced traceable CP-ABE scheme against various types of privilege leakage in cloud storage

TL;DR: Wang et al. as mentioned in this paper proposed a CP-ABE scheme with enhanced traceability, which intertwines white-box and black-box traceability together securely and efficiently, which makes it more targeted and simpler to solve distinct tracing problems.
Journal ArticleDOI

A survey on cryptographic techniques for protecting big data security: present and forthcoming

TL;DR: A compatible and comprehensive reference cryptographic architecture for big data security (Z-CABDS) is proposed, which can be used to guide each sub-direction to cooperate with each other to achieve the full life cycle security of big data.
Journal ArticleDOI

Accountable multi-authority attribute-based data access control in smart grids

TL;DR: In this paper , an accountability multi-authority access control framework based attribute-based encryption (ABE) on for smart grid was proposed to solve the single-point failure problem in the smart grid, and also support securely fine-grained access control to sharing data in real time.
Journal ArticleDOI

A metaverse-oriented CP-ABE scheme with cryptographic reverse firewall

TL;DR: Wang et al. as discussed by the authors constructed an efficient ciphertext-policy attribute-based encryption (CP-ABE) scheme supporting CRF protection which has function of outsourcing decryption, offline encryption and black-box tracking.
References
More filters
Proceedings ArticleDOI

Ciphertext-Policy Attribute-Based Encryption

TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Book ChapterDOI

Multi-authority attribute based encryption

TL;DR: The question of whether a scheme could be constructed in which multiple authorities were allowed to distribute attributes is answered in the affirmative and how to apply the techniques to achieve a multiauthority version of the large universe fine grained access control ABE is shown.
Proceedings Article

Outsourcing the decryption of ABE ciphertexts

TL;DR: It is shown how a user can provide the cloud with a single transformation key that allows the cloud to translate any ABE ciphertext satisfied by that user's attributes into a (constant-size) El Gamal-style ciphertext, without the cloud being able to read any part of the user's messages.
Journal ArticleDOI

White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures

TL;DR: This work adds traceability to an existing expressive, efficient, and secure CP-ABE scheme without weakening its security or setting any particular trade-off on its performance.
Related Papers (5)