Efficient ciphertext-policy attribute-based encryption with blackbox traceability

Traitor tracing scheme is a paradigm to classify the users who illegal use of their decryption keys in cryptosystems. In the ciphertext-policy attribute-based cryptosystem, the decryption key usually contains the users’ attributes, while the real identities are hidden. The decryption key with hidden...

Full description

Saved in:
Bibliographic Details
Main Authors: XU, Shengmin, YUAN, Jiaming, XU, Guowen, Li, Yingjiu, LIU, Ximeng, ZHANG, Yinghui, YANG, Zuobin
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2020
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/5179
https://ink.library.smu.edu.sg/context/sis_research/article/6182/viewcontent/Efficient_ciphertext_policy_2020_av.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-6182
record_format dspace
spelling sg-smu-ink.sis_research-61822021-05-14T00:37:38Z Efficient ciphertext-policy attribute-based encryption with blackbox traceability XU, Shengmin YUAN, Jiaming XU, Guowen Li, Yingjiu LIU, Ximeng ZHANG, Yinghui YANG, Zuobin Traitor tracing scheme is a paradigm to classify the users who illegal use of their decryption keys in cryptosystems. In the ciphertext-policy attribute-based cryptosystem, the decryption key usually contains the users’ attributes, while the real identities are hidden. The decryption key with hidden identities enables malicious users to intentionally leak decryption keys or embed the decryption keys in the decryption device to gain illegal profits with a little risk of being discovered. To mitigate this problem, the concept of blackbox traceability in the ciphertext-policy attribute-based scheme was proposed to identify the malicious user via observing the I/O streams of the decryption device. However, current solutions with blackbox traceability are impractical since either the composite-order group or the linear complexity of system users is required. In this article, we proposed a secure ciphertext-policy attribute-based set encryption scheme with the short decryption key. The proposed scheme bases on the prime-order group to improve computational performances and aggregates multiple attributes into a constant-size attribute set to reduce the costs of communication overheads. By applying our proposed scheme with fingerprint codes, we then give an instantiation of the ciphertext-policy attribute-based scheme with blackbox traceability. Our scheme is provably secure under various q-type assumptions. 2020-10-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/5179 info:doi/10.1016/j.ins.2020.05.115 https://ink.library.smu.edu.sg/context/sis_research/article/6182/viewcontent/Efficient_ciphertext_policy_2020_av.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Blackbox traceability Attribute-based encryption Short decryption key Information Security Software Engineering
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Blackbox traceability
Attribute-based encryption
Short decryption key
Information Security
Software Engineering
spellingShingle Blackbox traceability
Attribute-based encryption
Short decryption key
Information Security
Software Engineering
XU, Shengmin
YUAN, Jiaming
XU, Guowen
Li, Yingjiu
LIU, Ximeng
ZHANG, Yinghui
YANG, Zuobin
Efficient ciphertext-policy attribute-based encryption with blackbox traceability
description Traitor tracing scheme is a paradigm to classify the users who illegal use of their decryption keys in cryptosystems. In the ciphertext-policy attribute-based cryptosystem, the decryption key usually contains the users’ attributes, while the real identities are hidden. The decryption key with hidden identities enables malicious users to intentionally leak decryption keys or embed the decryption keys in the decryption device to gain illegal profits with a little risk of being discovered. To mitigate this problem, the concept of blackbox traceability in the ciphertext-policy attribute-based scheme was proposed to identify the malicious user via observing the I/O streams of the decryption device. However, current solutions with blackbox traceability are impractical since either the composite-order group or the linear complexity of system users is required. In this article, we proposed a secure ciphertext-policy attribute-based set encryption scheme with the short decryption key. The proposed scheme bases on the prime-order group to improve computational performances and aggregates multiple attributes into a constant-size attribute set to reduce the costs of communication overheads. By applying our proposed scheme with fingerprint codes, we then give an instantiation of the ciphertext-policy attribute-based scheme with blackbox traceability. Our scheme is provably secure under various q-type assumptions.
format text
author XU, Shengmin
YUAN, Jiaming
XU, Guowen
Li, Yingjiu
LIU, Ximeng
ZHANG, Yinghui
YANG, Zuobin
author_facet XU, Shengmin
YUAN, Jiaming
XU, Guowen
Li, Yingjiu
LIU, Ximeng
ZHANG, Yinghui
YANG, Zuobin
author_sort XU, Shengmin
title Efficient ciphertext-policy attribute-based encryption with blackbox traceability
title_short Efficient ciphertext-policy attribute-based encryption with blackbox traceability
title_full Efficient ciphertext-policy attribute-based encryption with blackbox traceability
title_fullStr Efficient ciphertext-policy attribute-based encryption with blackbox traceability
title_full_unstemmed Efficient ciphertext-policy attribute-based encryption with blackbox traceability
title_sort efficient ciphertext-policy attribute-based encryption with blackbox traceability
publisher Institutional Knowledge at Singapore Management University
publishDate 2020
url https://ink.library.smu.edu.sg/sis_research/5179
https://ink.library.smu.edu.sg/context/sis_research/article/6182/viewcontent/Efficient_ciphertext_policy_2020_av.pdf
_version_ 1770575322176028672