Adaptively secure attribute-based encryption for traitor tracing
Academic paper|更新时间:2024-06-05
|
Adaptively secure attribute-based encryption for traitor tracing
Journal on CommunicationsVol. 37, Issue 1, Pages: 76-87(2016)
作者机构:
1. 南通大学计算机科学与技术学院,江苏 南通 226019
2. 同济大学计算机科学与技术系,上海 201804
3. 南通大学理学院,江苏 南通 226007
作者简介:
基金信息:
The National Natural Science Foundation of China(61402244);The National Natural Science Foundation of China(61272424);The National Natural Science Foundation of China(61202006);The National Natural Science Foundation of China(61272107);The National Natural Science Foundation of China(61202173);The National Natural Science Foundation of China(61103068);The Joint of NSFC and Microsoft Asia Research Program(60970155);The Program of Shanghai Subject Chief Scientist(10XD1404400);The Ph.D.Programs Foundation of Ministry of Education(20090072110035);Shanghai Natural Science Foundation Program(13ZR1443100);The Natural Science Foundation of Nan tong University(15Z06)
For the key abuse problem in attribute-based encryption (ABE)
each user was identified by his unique identity
and the collusion secure codes and the traitor tracing mechanism were introduced to the ABE scheme. The definition
security model and tracing model for adaptively secure attribute-based encryption for traitor tracing (ABTT)were forma-lized
and an adaptively secure ABTT scheme was proposed
which may trace traitors in policy-specific pirate decorders. Under these subgroup decision assumptions in composite groups and the DDH assumption
adaptively secure and can adaptively trace traitors were proved. Therefore
the scheme not only was capable of tracing adaptively traitors in policy-specific pirate decorders
but also further strengthens the security of ABE system
which has theoretical and prac-tical values.
关键词
Keywords
references
SAHAI A , WATERS B . Fuzzy identity based encryption [C ] // The EUROCRYPT . Aarhus,Denmark , c 2005 : 457 - 473 .
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [C ] // The 13th ACM Conference on Computer and Communication Security . Alexandria,Virginia,USA , c 2006 : 89 - 98 .
HINEK M J , JIANG S , SAFAVI-NAINI R , et al . Attribute-based encryption with key cloning protection [EB/OL ] . http://eprint.iacr.org/2008/478.pdf http://eprint.iacr.org/2008/478.pdf .
MA H Y , ZENG G S . An attribute-based encryption scheme for traitor tracing and revocation together [J ] . Chinese Journal of Computers , 2012 , 35 ( 9 ): 1845 - 1855 .
WANG Y T , CHEN K F , CHEN J H . Attribute-based traitor tracing [J ] . Journal of Information Science and Engineering , 2011 , 27 ( 1 ): 181 - 195 .
LI J , REN K , KIM K . A 2 BE: accountable attribute-based encryption for abuse free access control [EB/OL ] . http://eprint.iacr.org/2009/118.pdf http://eprint.iacr.org/2009/118.pdf .
YU S C , REN K , LOU W J , et al . Defending against key abuse attacks in KP-ABE enabled broadcast system [C ] // The Security and Privacy in Communication Networks . Athens,Greece , c 2009 : 311 - 329 .
BONEH D , SHAW J . Collusion-secure fingerprinting for digital da-ta [C ] // The CRYPTO'95. Santa Barbara , California, USA , c 1995 : 452 - 465 .
ABDALLA M , DENT A W , MALONE-LEE J , et al . Identity-based traitor tracing [C ] // The public Key Cryptography . Beijing, China , c 2007 : 298 - 314 .
LIU Z , CAO Z , WONG D S . Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption ices on eBay [C ] // The 20th Conference on Computer and Communication Se-curity . Berlin,Germany , c 2013 : 475 - 486 .
LEWKO A , OKAMOTO T , SAHAI A , et al . Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption [C ] // The EUROCRYPT . c 2010 : 62 - 91 .
WATERS B . Dual system encryption: realizing fully secure ibe and hibe under simple assumptions [C ] // The CRYPTO'09 . Santa Barbara, California,USA , c 2009 : 619 - 636 .
GREEN M , AKINYELE A , RUSHANAN M . Libfenc: The Functional Encryption Library [EB/OL ] . http://code.google.com/p/libfenc http://code.google.com/p/libfenc .