Computer Science ›› 2017, Vol. 44 ›› Issue (5): 160-165.doi: 10.11896/j.issn.1002-137X.2017.05.028

Previous Articles     Next Articles

Publicly Accountable Ciphertext-policy Attribute-based Encryption Scheme

MA Xiao-xiao and YU Gang   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Ciphertext-policy attribute-based encryption (ABE) enables fine-grained access control of decryption privilege by using the matching relation between the attribute set and the access structure,and is a promising one-to-many encryption primitive which has a bright application prospect in cloud computing,big data etc.However,an attribute set may be owned by many users in ABE, i.e. one decryption key may belong to many users.Thus,malicious users dare to leak their decryption privileges to others for profits.Furthermore,a semi-trust authority may illegally generate decryption keys to unauthorized users.To solve these two kinds of key abuses in ABE,we proposed a publicly accountable ciphertext-policy attribute-based encryption scheme by embedding both signatures of user and authority into the secret key.The proposed scheme can achieve traceability and accountability,in which anybody can trace the identity of a leaked decryption key,and an auditor can verify whether the leaked key is shared by a malicious user or is illegally generated by a semi-trust authority.At last,the security of the proposed scheme can be proved based on the security of its atomic encryption and signature schemes.

Key words: Attribute-based encryption,Traceability,Public accountability,Nonrepudiation

[1] SAHAI A,WATERS B.Fuzzy identity based encryption [C]∥Advances in Cryptology-EUROCRYPT 2005,LNCS 3494.Springer-Verlag,2005:457-473.
[2] GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data [C]∥Proceedings of the 13th ACM Conference on Computer and Communications Security.ACM,2006:89-98.
[3] OSTROVSKY R,SAHAI A,WATERS B.Attribute-based en-cryption with non-monotonic access structures[C]∥Procee-dings of ACM Conference on Computer and Communication Security-CCS 2007.ACM Press,2007:195-203.
[4] LEWKO A,OKAMOTO T,SAHAI A,et al.Fully secure functional encryption:attribute-based encryption and (hierarchical) inner product encryption [C]∥Advances in Cryptology-EUROCRYPT 2010,LNCS 6110.Springer-Verlag,2010:62-91.
[5] OKAMOTO T,TAKASHIMA K.Fully secure functional encryption with general relations from the decisional linear assumption[C]∥Advances in Cryptology-CRYPTO 2010.Sprin-ger-Verlag,2010:191-208.
[6] HERRANZ J,LAGUILLAUMIE F,RAFOLS C.Constant-size ciphertext in threshold attribute-based encryption [C]∥Proceedings of Public Key Cryptology-PKC 2010,LNCS 6056.Springer-Verlag,2010:19-34.
[7] WATERS B.Ciphertext-policy attribute-based encryption:Anexpressive,efficient,and provably secure realization [C]∥Public Key Cryptography- PKC 2011.Springer Berlin Heidelberg,2011:53-70.
[8] YAMADA S,ATTRAPADUNG N,H ANAOKA G,et al.Generic constructions for chosen ciphertext secure attribute based encryption [C]∥Proceedings of Public Key Cryptology- PKC 2011,LNCS 6571.Springer-Verlag,2011:71-89.
[9] LEWKO A,WATERS B.New proof methods for attribute-based encryption:achieving full security through selective techniques [C]∥Advances in Cryptology-CRYPTO 2012,LNCS 7417.Springer-Verlag,2012:180-198.
[10] HOHENBERGER S,WATERS B.Attribute based encryption:with fast decryption [C]∥Proceedings of Public Key Cryptology-PKC 2013.Springer-Verlag,2013:162-179.
[11] ROUSELAKIS Y,WATERS B.Practical constructions and new proof methods for large universe attribute-based encryption [C]∥Proceedings of the 2013 ACM SIGSAC Conference on Computer &Communications Security.ACM,2013:463-474.
[12] NARUSE T,MOHRI M,SHIRAISHI Y.Attribute-based en-cryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating[M]∥Future Information Technology.2014:119-125.
[13] QIAN H,LI J,ZHANG Y,et al.Privacy Preserving PersonalHealth Record Using Multi-Authority Attribute-Based Encryption with Revocation[J].International Journal of Information Security,2015,14(6):487-497.
[14] ZHANG K,GONG J,TANG S,et al.Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation[C]∥Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security.ACM,2016:269-279.
[15] SHI Y,ZHENG Q,LIU J,et al.Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation[J].Information Sciences,2015,295:221-231.
[16] HINEK M J,JIANG S,SAFAVI-NAINI R,et al.Attribute-based encryption with key cloning protection [J].Bulltein of the Korean Mathematical Society,2008,2008(4):803-819.
[17] YU S,REN K,LOU W,et al.Defending against key abuse attacks in KP-ABE enabled broadcast systems [C]∥Security and Privacy in Communication Networks.Springer Berlin Heidelberg,2009:311-329.
[18] LI J,REN K,KIM K.A2BE:Accountable attribute-based en-cryption for abuse free access control[EB/OL].[2009-03-11].
[19] KATZ J,SCHRODER D.Tracing insider attacks in the context of predicate encryption schemes[EB/ OL].https://
[20] LIU Z,CAO Z,WONG D S.White-box traceable ciphertext-po-licy attribute-based encryption supporting any monotone access structures[J].IEEE Transactions on Information Forensics and Security,2013,8(1):76-88.
[21] NING J,DONG X,CAO Z,et al.White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes[J].IEEE Transactions on Information Forensics and Security,2015,10(6):1274-1288.
[22] ZHANG X,JIN C,WEN Z,et al.Attribute-Based Encryptionwithout Key Escrow[C]∥Cloud Computing and Security 2015,LNCS 9483.Springer-Verlag,2015:74-87.
[23] BONEH D,LYNN B,SHACHAM H.Short signatures from the Weil pairing [C]∥Advances in Cryptology—ASIACRYPT 2001.Springer Berlin Heidelberg,2001:514-532.
[24] POINTCHEVAL D,STERN J.Security arguments for digital signatures and blind signature[J].Journal of Cryptology,2000,13(3):361-396.

No related articles found!
Full text



No Suggested Reading articles found!