[go: up one dir, main page]

skip to main content
10.1145/1966913.1966964acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
short-paper

Multi-authority ciphertext-policy attribute-based encryption with accountability

Published: 22 March 2011 Publication History

Abstract

Attribute-based encryption (ABE) is a promising tool for implementing fine-grained cryptographic access control. Very recently, motivated by reducing the trust assumption on the authority, and enhancing the privacy of users, a multiple-authority key-policy ABE system, together with a semi-generic anonymous key-issuing protocol, have been proposed by Chase and Chow in CCS 2009. Since ABE allows encryption for multiple users with attributes satisfying the same policy, it may not be always possible to associate a decryption key to a particular individual. A misbehaving user could abuse the anonymity by leaking the key to someone else, without worrying of being traced. In this paper, we propose a multi-authority ciphertext-policy (AND gates with wildcard) ABE scheme with accountability, which allows tracing the identity of a misbehaving user who leaked the decryption key to others, and thus reduces the trust assumptions not only on the authorities but also the users. The tracing process is efficient and its computational overhead is only proportional to the length of the identity.

References

[1]
M. Abdalla, D. Catalano, A. W. Dent, J. Malone-Lee, G. Neven, and N. P. Smart. Identity-Based Encryption Gone Wild. In ICALP, volume 4052 of LNCS, pages 300--311, 2006.
[2]
J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy, pages 321--334, 2007.
[3]
M. Chase. Multi-Authority Attribute Based Encryption. In TCC, volume 4392 of LNCS, pages 515--534, 2007.
[4]
M. Chase and S. S. M. Chow. Improving Privacy and Security in Multi-Authority Attribute-Based Encryption. In ACM CCS, pages 121--130, New York, NY, USA, 2009.
[5]
L. Cheung and C. Newport. Provably Secure Ciphertext Policy ABE. In ACM CCS, pages 456--465, 2007.
[6]
S. S. M. Chow. New Privacy-Preserving Architectures for Identity-/Attribute-based Encryption. PhD thesis, New York University, 2010.
[7]
V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. In ACM CCS, pages 89--98, 2006.
[8]
M. J. Hinek, S. Jiang, R. Safavi-Naini, and S. F. Shahandashti. Attribute-Based Encryption with Key Cloning Protection. Cryptology ePrint 2008/478.
[9]
J. Li and K. Kim. Hidden Attribute-Based Signatures without Anonymity Revocation. Inf. Sci., 180(9):1681--1689, 2010.
[10]
J. Li, K. Ren, and K. Kim. A 2 BE: Accountable Attribute-Based Encryption for Abuse Free Access Control. Cryptology ePrint 2009/118, 2009.
[11]
J. Li, K. Ren, B. Zhu, and Z. Wan. Privacy-Aware Attribute-Based Encryption with User Accountability. In ISC, volume 5735 of LNCS, pages 347--362, 2009. Full version available at http://eprint.iacr.org/2009/284.
[12]
T. Nishide, K. Yoneyama, and K. Ohta. Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structure. In ACNS, volume 5037 of LNCS, pages 111--129, 2008. Journal version appeared in IEICE Transactions 92-A(1): 22--32 (2009).
[13]
A. Sahai and B. Waters. Fuzzy Identity-Based Encryption. In EUROCRYPT, volume 3494 of LNCS, pages 457--473, 2005.
[14]
S. Yu, K. Ren, W. Lou, and J. Li. Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. In SECURECOMM, 2009. Full version available at http://eprint.iacr.org/2009/295.

Cited By

View all
  • (2024)Secure Information in Cloud Storage Using Hierarchical-authority Attribute-Based Encryption (HABE): A Literature ReviewKnE Social Sciences10.18502/kss.v9i6.15283Online publication date: 12-Mar-2024
  • (2024)Attribute-Based Access Control Scheme for Secure Identity Resolution in Prognostics and Health ManagementIEEE Internet of Things Journal10.1109/JIOT.2024.338707911:13(23140-23155)Online publication date: 1-Jul-2024
  • (2024)Traceable Attribute-Based Encryption With Equality Test for Cloud Enabled E-Health SystemIEEE Journal of Biomedical and Health Informatics10.1109/JBHI.2023.332193928:9(5033-5042)Online publication date: Sep-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIACCS '11: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
March 2011
527 pages
ISBN:9781450305648
DOI:10.1145/1966913
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 March 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. access control
  2. accountability
  3. anonymity
  4. attribute-based encryption
  5. ciphertext-policy
  6. multi-authority
  7. policy-privacy

Qualifiers

  • Short-paper

Funding Sources

Conference

ASIA CCS '11
Sponsor:

Acceptance Rates

ASIACCS '11 Paper Acceptance Rate 35 of 217 submissions, 16%;
Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)53
  • Downloads (Last 6 weeks)7
Reflects downloads up to 12 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Secure Information in Cloud Storage Using Hierarchical-authority Attribute-Based Encryption (HABE): A Literature ReviewKnE Social Sciences10.18502/kss.v9i6.15283Online publication date: 12-Mar-2024
  • (2024)Attribute-Based Access Control Scheme for Secure Identity Resolution in Prognostics and Health ManagementIEEE Internet of Things Journal10.1109/JIOT.2024.338707911:13(23140-23155)Online publication date: 1-Jul-2024
  • (2024)Traceable Attribute-Based Encryption With Equality Test for Cloud Enabled E-Health SystemIEEE Journal of Biomedical and Health Informatics10.1109/JBHI.2023.332193928:9(5033-5042)Online publication date: Sep-2024
  • (2024)ACMDS: An Anonymous Collaborative Medical Data Sharing Scheme Based on BlockchainWeb and Big Data10.1007/978-981-97-7241-4_17(261-277)Online publication date: 31-Aug-2024
  • (2023)Ensuring Privacy in Wireless Channels with Physical Layer Security: A Survey of Encryption StrategiesJournal of Ubiquitous Computing and Communication Technologies10.36548/jucct.2023.4.0065:4(412-422)Online publication date: Dec-2023
  • (2023)Secured and Privacy-Preserving Multi-Authority Access Control System for Cloud-Based Healthcare Data SharingSensors10.3390/s2305261723:5(2617)Online publication date: 27-Feb-2023
  • (2023)A Brief Review on Attribute-Based Encryption ApproachesSSRN Electronic Journal10.2139/ssrn.4526403Online publication date: 2023
  • (2023)A Role-Based Encryption (RBE) Scheme for Securing Outsourced Cloud Data in a Multi-Organization ContextIEEE Transactions on Services Computing10.1109/TSC.2022.319425216:3(1647-1661)Online publication date: 1-May-2023
  • (2023)Generic Construction of Black-Box Traceable Attribute-Based EncryptionIEEE Transactions on Cloud Computing10.1109/TCC.2021.312168411:1(942-955)Online publication date: 1-Jan-2023
  • (2023)Attribute-Based Pseudonymity for Privacy-Preserving Authentication in Cloud ServicesIEEE Transactions on Cloud Computing10.1109/TCC.2021.308453811:1(168-184)Online publication date: 1-Jan-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media