Abstract

ABE has been widely applied for secure data protection in cloud computing. In ABE, user's private keys are generated by attribute authority, thus, attribute authority has the ultimate privileges in the system and can impersonate any users to forge valid signatures. Once the attribute authority become dishonest or be invaded in cloud systems, the system's security will be at risk. To better solve the problem mentioned above, in this paper, we propose a key-policy attribute based signature scheme with untrusted authority and traceability (KP-ABS-UT). In our scheme, the signer's private key is composed by two components: one part is distributed by attribute authority and the other part is chosen privately by the signer's self. Thus attribute authority cannot forge any signatures which should be signed by legal users. Besides, our scheme introduces an entity tracer, which can trace the identity of signer when necessary. By security analysis and efficiency comparison, we prove our KP-ABS-UT scheme meets the requirements of unforgeability as well as lower computation cost.

Highlights

  • With the various information resources increasing rapidly in the cloud, users are faced with urgent problems like how to make data sharing among resources efficiently and securely

  • KP-ABE [2, 3] is a typical class of ABE.As is shown in Fig. 1, a user’s private key corresponds to an access tree structure

  • The overall comparison shows our KP-ABS-UT is of better performance and is more appropriate for secure data verification in open network systems such as cloud computing, etc

Read more

Summary

Introduction

With the various information resources increasing rapidly in the cloud, users are faced with urgent problems like how to make data sharing among resources efficiently and securely On this occasion, Sahai proposed a new cryptographic primitive named “ABE” (attribute based encryption) [1]. To better solve the problems discussed above, in this paper, we construct a KP-ABS-UT (key-policy attribute based signature with untrusted authority and traceability) scheme, which has the following merits: (1) the signature is unforgeable, even attribute authority cannot impersonate any users to forge legal signatures; (2) the overall computation cost of the whole process of signing and verifying is reduced sharply; (3) the signer’s identity can be traced by the system administer if necessary.

Related works and preliminaries
CCA qxð0Þ:pxð0Þ1H1ðMjjσidl Þsþr
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.