Computer Science ›› 2020, Vol. 47 ›› Issue (4): 292-297.doi: 10.11896/jsjkx.190300144

• Information Security • Previous Articles     Next Articles

Online/Offline Attribute-based Encryption with User and Attribute Authority Accountability

SHI Yu-qing, LING Jie   

  1. Faculty of Computers,Guangdong University of Technology,Guangzhou 510006,China
  • Received:2019-03-27 Online:2020-04-15 Published:2020-04-15
  • Contact: LING Jie,born in 1964,Ph.D,professor,is a member of China Computer Federation.His main research interests include cryptography,information security and intelligent video processing.
  • About author:SHI Yu-qing,born in 1994,postgra-duate,is a member of China Computer Federation.His main research interests include cryptography and information security.
  • Supported by:
    This work was supported by the Key Area Research and Development Program of Guangdong Province(2019B010139002) and Science and Technology Plan Project of Guangzhou(201902020006,201902020007,201902010034)

Abstract: As a one-to-many encryption mechanism,attribute-based encryption can provide good plaintext security and fine-grained access control for cloud storage.However,in ciphertext-policy attribute-based encryption,one decryption private key may correspond to multiple users,so users may illegally share their private keys for improper benefits,and semi-trusted attribute authority may issue decryption private keys to illegal users.In addition,the exponential computation generated by encrypting messages grows as the complexity of access policies increases,and the computational overhead generated poses a significant challenge to users who encrypt via mobile devices.Aiming at the above problems,this paper proposed an online/offline ciphertext-policy attribute-based encryption scheme with user and attribute authority accountability that supports large universe of attributes,the scheme is constructed based on prime order bilinear groups.By embedding the user’s identity information into the user’s private key to achieve accountability,and uses the online/offline encryption technology to move most of the encryption overhead to the offline phase.Lastly,the selective security and accountable proof of the scheme in the standard model was given.The analysis shows that the encryption overhead of the scheme is mainly in the offline phase,and the storage cost for tracking is also extremely low,which is suitable for users who use resource-limited mobile devices for encryption.

Key words: Accountable, Attribute-based encryption, Large universe, Online/offline, Standard model

CLC Number: 

  • TP309
[1]SAHAI A,WATERS B.Fuzzy identity-based encryption[M]//Advances in Cryptology-EUROCRYPT2005.Springer-Verlag,2005:457-473.
[2]GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.New York:ACM,2006:89-98.
[3]OSTROVSKY R,SAHAI A,WATERS B.Attribute-based encryption with non-monotonic access structures[C]//Procee-dings of the 14th ACM Conference on Computer and Communications Security.New York:ACM,2007:195-203.
[4]GOYAL V,JAIN A,PANDEY O,et al.Bounded CiphertextPolicy Attribute Based Encryption [M]//Proceedings of the 35th International Colloquium on Automata,Languages and Programming.Springer-Verlag,2008:579-591.
[5]BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy attribute-based encryption[C]//Proceedings of the 2007 IEEE Symposium on Security and Privacy.IEEE,2007:321-334.
[6]WATERS B.Ciphertext-policy attribute-based encryption:anexpressive,efficient,and provably secure realization[M]//Proceedings of PublicKey Cryptography-PKC 2011.Springer-Verlag,2011:53-70.
[7]LEWKO A,OKAMOTO T,SAHAI A,et al.Fully secure functional encryption:attribute-based encryption and (hierarchical) inner product encryption[M]//Advances in Cryptology-EUROCRYPT 2010.Springer-Verlag,2010:62-91.
[8]OKAMOTO T,TAKASHIMA K.Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption[M]//Advances in Cryptology-CRYPTO 2010.Sprin-ger-Verlag,2010:191-208.
[9]LEWKO A,WATERS B.New proof methods for attributebased encryption:Achieving full security through selective techniques[M]//Advances in Cryptology-CRYPTO 2012.Springer-Verlag,2012:180-198.
[10]HERRANZ J,LAGUILLAUMIE F,RAFOLS C.Constant Size Ciphertexts in Threshold Attribute-Based Encryption[M]//Proceedings of PublicKey Cryptography-PKC 2010.Springer-Verlag,2010:19-34.
[11]GREEN M,HOHENBERGER S,WATERS B.Outsourcing the Decryption of ABE Ciphertexts[C]//Proceedings of the 20th USENIX Conference on Security.USENIX Association,2011:523-538.
[12]HOHENBERGER S,WATERS B.Online/Offline AttributeBased Encryption[M]//PublicKey Cryptography-PKC 2014.Springer-Verlag,2014:293-310.
[13]LEWKO A,WATERS B.Unbounded HIBE and AttributeBased Encryption[M]//Advances in Cryptology-EUROCRYP-T2005.Springer-verlag,2011:547-567.
[14]ROUSELAKIS Y,WATERS B.Practical constructions and new proof methods for large universe attribute-based encryption[C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security.New York:ACM,2013:463-474.
[15]HINEK M J,JIANG S,SAFAVI-NAINI R,et al.Attributebased encryption with key cloning protection[EB/OL].(2008-11-12) [2019-03-13].https://eprint.iacr.org/2008/478.
[16]LI J,REN K,KIM K.A2BE:Accountable attribute-based encryption for abuse free access control[EB/OL].(2009-04-14) [2019-03-13].https://eprint.iacr.org/2009/118.
[17]LIU Z,CAO Z,WONG D S.White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures[J].IEEE Transactions on Information Forensics and Security,2013,8(1):76-88.
[18]NING J,DONG X,CAO Z,et al.White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes[J].IEEE Transactions on Information Forensics and Security,2015,10(6):1274-1288.
[19]ZHANG X,JIN C,LI C,et al.Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability[C]//International Conference on Security and Privacy in Communication Networks.Springer,2015:500-518.
[20]NING J,DONG X,CAO Z,et al.Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud[M]//EuropeanSympo-siumon Research in Computer Security-ESORICS 2015.Sprin-ger,2015:270-289.
[21]MA X,YU G.Publicly Accountable Ciphertext-policy Attribute-based Encryption Scheme[J].Computer Science,2017,44(5):160-165.
[22]ZHANG K,MA J,ZHANG J,et al.Online/Offline Traceable Attribute-Based Encryption [J].Computer Research andDeve-lopment,2018,55(1):216-224.
[23]BEIMEL A.Secure schemes for secret sharing and key distribution[D].Haifa,Israel:Technion-Israel Institute of Technology,1996.
[24]BONEH D,FRANKLIN M.Identity-Based Encryption from the Weil Pairing[M]//Advances in Cryptology-CRYPTO 2001.Springer-Verlag,2001:213-229.
[25]BONEH D,BOYEN X.Short Signatures Without Random Oracles[M]//Advances in Cryptology-EUROCRYPT 2004.Sprin-ger-Verlag,2004:56-73.
[26]GOYAL V.Reducing trust in the PKG in identity based cryptosystems[M]//Advances in Cryptology-CRYPTO 2007.Sprin-ger-Verlag,2007:430-447.
[27]GOYAL V,LU S,SAHAI A,et al.Black Box Accountable Authority Identity-Based Encryption[C]//Proceedings of the 2008 ACM Conference on Computer and Communications Security.New York:ACM,2008:427-436.
[1] HE Heng, JIANG Jun-jun, FENG Ke, LI Peng, XU Fang-fang. Efficient Multi-keyword Retrieval Scheme Based on Attribute Encryption in Multi-cloud Environment [J]. Computer Science, 2021, 48(11A): 576-584.
[2] MA Xiao-xiao and HUANG Yan. Publicly Traceable Accountable Ciphertext Policy Attribute Based Encryption Scheme Supporting Large Universe [J]. Computer Science, 2020, 47(6A): 420-423.
[3] LIU Sheng-jie, WANG Jing. Privacy Preserving Scheme for SNS in Cloud Environment [J]. Computer Science, 2019, 46(2): 133-138.
[4] CHU Xiao-lu, LIU Pei-shun. Multi-authority Encryption Scheme Based on Public and Private Attributes [J]. Computer Science, 2018, 45(11): 124-129.
[5] YAN Ming, ZHANG Ying-hui, ZHENG Dong, LV Liu-di, SU Hao-nan. Flexibly Accessed and Vaguely Searchable EHR Cloud Service System [J]. Computer Science, 2018, 45(10): 172-177.
[6] WENG An-xiang and LING Jie. Improved Scheme of CP-ABE with Hidden Access Structure [J]. Computer Science, 2017, 44(Z11): 377-380.
[7] MA Xiao-xiao and YU Gang. Publicly Accountable Ciphertext-policy Attribute-based Encryption Scheme [J]. Computer Science, 2017, 44(5): 160-165.
[8] SONG Wen-na, XIANG Guang-li, LI An-kang, ZHANG Yue-xin and TAO Ran. Improved Attribute-based Encryption Scheme [J]. Computer Science, 2017, 44(1): 167-171.
[9] DING Xiao-hong, QIN Jing-yuan and WANG Xin. Attribute-based Encryption Scheme with Outsourcing Decryption Method [J]. Computer Science, 2016, 43(Z6): 357-360.
[10] YIN Kai-ze and WANG Hai-hang. Research on Access Control Model in Multi-clouds Storage System Based on CP-ABE [J]. Computer Science, 2016, 43(9): 165-168.
[11] HUANG Bao-hua, JIA Feng-wei and WANG Tian-jing. Database Access Control Policy Based on Attribute in Cloud Storage Platform [J]. Computer Science, 2016, 43(3): 167-173.
[12] LIU Xiao-jian, WANG Li-sheng and LIAO Xin-kao. Multiple Permissions Secure Access Control Scheme Combining CP-ABE and XACML in Cloud Storage [J]. Computer Science, 2016, 43(3): 118-121.
[13] WANG Hai-ping and ZHAO Jing-jing. Ciphertext-policy Attribute-based Encryption with Anonymous Access Structure [J]. Computer Science, 2016, 43(2): 175-178.
[14] JIANG Di and HAN Yi-liang. Attribute-based Online/Offline Signcryption for Mobile Network [J]. Computer Science, 2016, 43(11): 221-225.
[15] LI Zuo-hui and CHEN Xing-yuan. ABE Scheme with Generalized Wildcards on Prime Order Groups [J]. Computer Science, 2016, 43(1): 186-190.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!