Back to Search Start Over

Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe.

Authors :
ZHEN LIU
WONG, DUNCAN S.
Source :
Computer Journal. Jul2016, Vol. 59 Issue 7, p983-1004. 22p.
Publication Year :
2016

Abstract

A blackbox traceable Attribute-Based Encryption (ABE) can identify a malicious user called traitor, which created a decryption box with respect to an attribute set (respectively, access policy), out of all the users who share the same attribute set (respectively, access policy). However, none of the existing traceable ABE schemes can also support revocation and large attribute universe, that is, being able to revoke compromised keys, and can take an exponentially large number of attributes. In this paper, we formalize the definitions and security models, and propose constructions of both Ciphertext-Policy ABE and Key-Policy ABE that support (i) public and fully collusion-resistant blackbox traceability, (ii) revocation, (iii) large universe and (iv) any monotonic access structures as policies (i.e. high expressivity).We also show that the schemes are secure and blackbox traceable in the standard model against selective adversaries. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
00104620
Volume :
59
Issue :
7
Database :
Academic Search Index
Journal :
Computer Journal
Publication Type :
Academic Journal
Accession number :
117091689
Full Text :
https://doi.org/10.1093/comjnl/bxv101