Revocable and decentralized attribute-based encryption

In this paper, we propose a revocable and decentralized attribute-based encryption (ABE) system that splits the task of decryption key generation across multiple attribute authorities (AAs) without requiring any central party such that it achieves attribute revocation by simply stopping updating of...

Full description

Saved in:
Bibliographic Details
Main Authors: CUI, Hui, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2016
Subjects:
ABE
Online Access:https://ink.library.smu.edu.sg/sis_research/3344
https://ink.library.smu.edu.sg/context/sis_research/article/4346/viewcontent/Revocable_ABE_2016_afv.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-4346
record_format dspace
spelling sg-smu-ink.sis_research-43462020-03-30T01:47:44Z Revocable and decentralized attribute-based encryption CUI, Hui DENG, Robert H., In this paper, we propose a revocable and decentralized attribute-based encryption (ABE) system that splits the task of decryption key generation across multiple attribute authorities (AAs) without requiring any central party such that it achieves attribute revocation by simply stopping updating of the corresponding private key. In our system, a party can easily behave as an AA by creating a public and private key pair without any global communication except the creation for the common system parameters, under which it can periodically issue/update private key components for users that reflect their attributes, and an AA can freely leave the system once its corresponding attribute is revoked without communication with other AAs. In addition, to revoke a user, those AAs that have issued private keys to this user easily cease the key updating process for the user without affecting other AAs' execution. For the construction of our system, the technical barrier is to make private keys collusion resistant. Since in our system each component of a user's private key at a time period may come from different AAs and there is no coordination between these AAs, traditional technique of binding together different components (issued by different AAs) of a private key by randomization cannot be employed. To overcome this, we tie the key components together and prevent collusion attacks between different users by embedding distinct identifiers and a commonly shared time attribute in these components. 2016-08-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/3344 info:doi/10.1093/comjnl/bxw007 https://ink.library.smu.edu.sg/context/sis_research/article/4346/viewcontent/Revocable_ABE_2016_afv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University revocation decentralization ABE Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic revocation
decentralization
ABE
Information Security
spellingShingle revocation
decentralization
ABE
Information Security
CUI, Hui
DENG, Robert H.,
Revocable and decentralized attribute-based encryption
description In this paper, we propose a revocable and decentralized attribute-based encryption (ABE) system that splits the task of decryption key generation across multiple attribute authorities (AAs) without requiring any central party such that it achieves attribute revocation by simply stopping updating of the corresponding private key. In our system, a party can easily behave as an AA by creating a public and private key pair without any global communication except the creation for the common system parameters, under which it can periodically issue/update private key components for users that reflect their attributes, and an AA can freely leave the system once its corresponding attribute is revoked without communication with other AAs. In addition, to revoke a user, those AAs that have issued private keys to this user easily cease the key updating process for the user without affecting other AAs' execution. For the construction of our system, the technical barrier is to make private keys collusion resistant. Since in our system each component of a user's private key at a time period may come from different AAs and there is no coordination between these AAs, traditional technique of binding together different components (issued by different AAs) of a private key by randomization cannot be employed. To overcome this, we tie the key components together and prevent collusion attacks between different users by embedding distinct identifiers and a commonly shared time attribute in these components.
format text
author CUI, Hui
DENG, Robert H.,
author_facet CUI, Hui
DENG, Robert H.,
author_sort CUI, Hui
title Revocable and decentralized attribute-based encryption
title_short Revocable and decentralized attribute-based encryption
title_full Revocable and decentralized attribute-based encryption
title_fullStr Revocable and decentralized attribute-based encryption
title_full_unstemmed Revocable and decentralized attribute-based encryption
title_sort revocable and decentralized attribute-based encryption
publisher Institutional Knowledge at Singapore Management University
publishDate 2016
url https://ink.library.smu.edu.sg/sis_research/3344
https://ink.library.smu.edu.sg/context/sis_research/article/4346/viewcontent/Revocable_ABE_2016_afv.pdf
_version_ 1770573117463199744