Black-Box and Public Traceability in Multi-authority Attribute Based Encryption
TLDR
This work proposes a new multiauthority CP-ABE with blackbox and public traceability, where the private keys are assigned by the cooperation between one central authority and multi-authorities, and indicates that the proposed scheme is highly efficient and provably secure under the security model.Abstract:
Ciphertext-policy Attribute-based encryption (CP-ABE) is a promising tool for implementing finegrained cryptographic access control. While the uniqueness of generating private keys brings extra security issues. The key escrow is inherent in CP-ABE systems because the trusted authority has the power to decrypt every ciphertext. The private keys are only associated with the attributes nor the user's identity. Some malicious users might be tempted to leak their decryption privileges for financial gain without the risk of being caught as the decryption privilege could be shared by multiple users who own the same set of attributes. We propose a new multiauthority CP-ABE with blackbox and public traceability, where the private keys are assigned by the cooperation between one central authority and multi-authorities. The performance and security analyses indicate that the proposed scheme is highly efficient and provably secure under the security model.read more
Citations
More filters
Journal ArticleDOI
P2HBT: Partially Policy Hidden E-Healthcare System with Black-Box Traceability
TL;DR: Wang et al. as mentioned in this paper proposed an effective traceable and robust data security mechanism for Electronic Health Record (EHR), which can perform fine-grained access control on encrypted EHRs, prevent the leakage of privacy contained in access policies and support tracing of traitors.
Journal ArticleDOI
An enhanced traceable CP-ABE scheme against various types of privilege leakage in cloud storage
TL;DR: Wang et al. as mentioned in this paper proposed a CP-ABE scheme with enhanced traceability, which intertwines white-box and black-box traceability together securely and efficiently, which makes it more targeted and simpler to solve distinct tracing problems.
Journal ArticleDOI
A survey on cryptographic techniques for protecting big data security: present and forthcoming
TL;DR: A compatible and comprehensive reference cryptographic architecture for big data security (Z-CABDS) is proposed, which can be used to guide each sub-direction to cooperate with each other to achieve the full life cycle security of big data.
Journal ArticleDOI
Accountable multi-authority attribute-based data access control in smart grids
TL;DR: In this paper , an accountability multi-authority access control framework based attribute-based encryption (ABE) on for smart grid was proposed to solve the single-point failure problem in the smart grid, and also support securely fine-grained access control to sharing data in real time.
Journal ArticleDOI
A metaverse-oriented CP-ABE scheme with cryptographic reverse firewall
TL;DR: Wang et al. as discussed by the authors constructed an efficient ciphertext-policy attribute-based encryption (CP-ABE) scheme supporting CRF protection which has function of outsourcing decryption, offline encryption and black-box tracking.
References
More filters
Proceedings ArticleDOI
Ciphertext-Policy Attribute-Based Encryption
TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Book ChapterDOI
Multi-authority attribute based encryption
TL;DR: The question of whether a scheme could be constructed in which multiple authorities were allowed to distribute attributes is answered in the affirmative and how to apply the techniques to achieve a multiauthority version of the large universe fine grained access control ABE is shown.
Proceedings Article
Outsourcing the decryption of ABE ciphertexts
TL;DR: It is shown how a user can provide the cloud with a single transformation key that allows the cloud to translate any ABE ciphertext satisfied by that user's attributes into a (constant-size) El Gamal-style ciphertext, without the cloud being able to read any part of the user's messages.
Journal ArticleDOI
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures
TL;DR: This work adds traceability to an existing expressive, efficient, and secure CP-ABE scheme without weakening its security or setting any particular trade-off on its performance.
Related Papers (5)
Improving privacy and security in multi-authority attribute-based encryption
Melissa Chase,Sherman S. M. Chow +1 more