Efficient attribute-based encryption with blackbox traceability

Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encryption. In CCS’13, Liu et al. proposed an attribute-based traitor tracing (ABTT) scheme with blackbox traceability which can trace decryption keys embedded in a decryption blackbox/device rather than...

Full description

Saved in:
Bibliographic Details
Main Authors: XU, Shengmin, YANG, Guomin, MU, Yi, LIU, Ximeng
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2018
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/5209
https://ink.library.smu.edu.sg/context/sis_research/article/6212/viewcontent/Untitled_3.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-6212
record_format dspace
spelling sg-smu-ink.sis_research-62122020-07-23T18:39:26Z Efficient attribute-based encryption with blackbox traceability XU, Shengmin YANG, Guomin MU, Yi LIU, Ximeng Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encryption. In CCS’13, Liu et al. proposed an attribute-based traitor tracing (ABTT) scheme with blackbox traceability which can trace decryption keys embedded in a decryption blackbox/device rather than tracing a well-formed decryption key. However, the existing ABTT schemes with blackbox traceability are based on composite order group and the size of the decryption key depends on the policies and the number of system users. In this paper, we revisit blackbox ABTT and introduce a new primitive called attribute-based set encryption (ABSE) based on key-policy ABE (KP-ABE) and identity-based set encryption (IBSE), which allows aggregation of multiple related policies and reduce the decryption key size in ABTT to be irrelevant to the number of system users. We present a generic construction of the ABTT scheme from our proposed ABSE scheme and fingerprint code based on the Boneh-Naor paradigm in CCS’08. We then give a concrete construction of the ABSE scheme which can be proven secure in the random oracle model under the decisional BDH assumption and a variant of q-BDHE assumption. 2018-10-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/5209 info:doi/10.1007%2F978-3-030-01446-9_11 https://ink.library.smu.edu.sg/context/sis_research/article/6212/viewcontent/Untitled_3.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Public-key cryptosystems Attribute-based encryption Blackbox traceability Computer and Systems Architecture Programming Languages and Compilers
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Public-key cryptosystems
Attribute-based encryption
Blackbox traceability
Computer and Systems Architecture
Programming Languages and Compilers
spellingShingle Public-key cryptosystems
Attribute-based encryption
Blackbox traceability
Computer and Systems Architecture
Programming Languages and Compilers
XU, Shengmin
YANG, Guomin
MU, Yi
LIU, Ximeng
Efficient attribute-based encryption with blackbox traceability
description Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encryption. In CCS’13, Liu et al. proposed an attribute-based traitor tracing (ABTT) scheme with blackbox traceability which can trace decryption keys embedded in a decryption blackbox/device rather than tracing a well-formed decryption key. However, the existing ABTT schemes with blackbox traceability are based on composite order group and the size of the decryption key depends on the policies and the number of system users. In this paper, we revisit blackbox ABTT and introduce a new primitive called attribute-based set encryption (ABSE) based on key-policy ABE (KP-ABE) and identity-based set encryption (IBSE), which allows aggregation of multiple related policies and reduce the decryption key size in ABTT to be irrelevant to the number of system users. We present a generic construction of the ABTT scheme from our proposed ABSE scheme and fingerprint code based on the Boneh-Naor paradigm in CCS’08. We then give a concrete construction of the ABSE scheme which can be proven secure in the random oracle model under the decisional BDH assumption and a variant of q-BDHE assumption.
format text
author XU, Shengmin
YANG, Guomin
MU, Yi
LIU, Ximeng
author_facet XU, Shengmin
YANG, Guomin
MU, Yi
LIU, Ximeng
author_sort XU, Shengmin
title Efficient attribute-based encryption with blackbox traceability
title_short Efficient attribute-based encryption with blackbox traceability
title_full Efficient attribute-based encryption with blackbox traceability
title_fullStr Efficient attribute-based encryption with blackbox traceability
title_full_unstemmed Efficient attribute-based encryption with blackbox traceability
title_sort efficient attribute-based encryption with blackbox traceability
publisher Institutional Knowledge at Singapore Management University
publishDate 2018
url https://ink.library.smu.edu.sg/sis_research/5209
https://ink.library.smu.edu.sg/context/sis_research/article/6212/viewcontent/Untitled_3.pdf
_version_ 1770575333228019712