Traceable attribute-based encryption scheme with key-delegation abuse resistance

Aiming at the problem that the traceability of a traceable attribute-based encryption (ABE) scheme was not sufficient to address the key abuse completely,a traceable ABE scheme against key-delegation abuse was proposed.A secret parameter was be shared to all user private key components corresponding...

Full description

Saved in:
Bibliographic Details
Main Authors: Xixi YAN, Xu HE, Tao LIU, Qing YE, Jinxia YU, Yongli TANG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2020-04-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2020016
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850211386230046720
author Xixi YAN
Xu HE
Tao LIU
Qing YE
Jinxia YU
Yongli TANG
author_facet Xixi YAN
Xu HE
Tao LIU
Qing YE
Jinxia YU
Yongli TANG
author_sort Xixi YAN
collection DOAJ
description Aiming at the problem that the traceability of a traceable attribute-based encryption (ABE) scheme was not sufficient to address the key abuse completely,a traceable ABE scheme against key-delegation abuse was proposed.A secret parameter was be shared to all user private key components corresponding to attributes,and the decryption was completed by using all these components together,such that only parts of them could not realize the decryption and the real key-delegation abuse resistance ability was be obtained consequently.A short signature technique was employed to prevent the tracing parameter embedded in a user private key from being forged,so as to achieve the traceability of the user who leaked his user private key.Supporting both key-delegation abuse resistance and user tracing enhances the security of the proposed scheme.And compared with related schemes,the proposed scheme has better advantage in terms of the parameters size and the computation cost.
format Article
id doaj-art-8dc1a9c40eac4e3382138bbc5022257a
institution OA Journals
issn 1000-436X
language zho
publishDate 2020-04-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-8dc1a9c40eac4e3382138bbc5022257a2025-08-20T02:09:34ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2020-04-014115016159734542Traceable attribute-based encryption scheme with key-delegation abuse resistanceXixi YANXu HETao LIUQing YEJinxia YUYongli TANGAiming at the problem that the traceability of a traceable attribute-based encryption (ABE) scheme was not sufficient to address the key abuse completely,a traceable ABE scheme against key-delegation abuse was proposed.A secret parameter was be shared to all user private key components corresponding to attributes,and the decryption was completed by using all these components together,such that only parts of them could not realize the decryption and the real key-delegation abuse resistance ability was be obtained consequently.A short signature technique was employed to prevent the tracing parameter embedded in a user private key from being forged,so as to achieve the traceability of the user who leaked his user private key.Supporting both key-delegation abuse resistance and user tracing enhances the security of the proposed scheme.And compared with related schemes,the proposed scheme has better advantage in terms of the parameters size and the computation cost.http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2020016attribute-based encryption;key-delegation abuse resistance;white-box;traceability
spellingShingle Xixi YAN
Xu HE
Tao LIU
Qing YE
Jinxia YU
Yongli TANG
Traceable attribute-based encryption scheme with key-delegation abuse resistance
Tongxin xuebao
attribute-based encryption;key-delegation abuse resistance;white-box;traceability
title Traceable attribute-based encryption scheme with key-delegation abuse resistance
title_full Traceable attribute-based encryption scheme with key-delegation abuse resistance
title_fullStr Traceable attribute-based encryption scheme with key-delegation abuse resistance
title_full_unstemmed Traceable attribute-based encryption scheme with key-delegation abuse resistance
title_short Traceable attribute-based encryption scheme with key-delegation abuse resistance
title_sort traceable attribute based encryption scheme with key delegation abuse resistance
topic attribute-based encryption;key-delegation abuse resistance;white-box;traceability
url http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2020016
work_keys_str_mv AT xixiyan traceableattributebasedencryptionschemewithkeydelegationabuseresistance
AT xuhe traceableattributebasedencryptionschemewithkeydelegationabuseresistance
AT taoliu traceableattributebasedencryptionschemewithkeydelegationabuseresistance
AT qingye traceableattributebasedencryptionschemewithkeydelegationabuseresistance
AT jinxiayu traceableattributebasedencryptionschemewithkeydelegationabuseresistance
AT yonglitang traceableattributebasedencryptionschemewithkeydelegationabuseresistance