Abstract
In the existing attribute-based encryption (ABE) scheme, the authority (i.e., private key generator (PKG)) is able to calculate and issue any user’s private key, which makes it completely trusted, which severely influences the applications of the ABE scheme. To mitigate this problem, we propose the black box traceable ciphertext policy attribute-based encryption (T-CP-ABE) scheme in which if the PKG re-distributes the users’ private keys for malicious uses, it might be caught and sued. We provide a construction to realize the T-CP-ABE scheme in a black box model. Our scheme is based on the decisional bilinear Diffie-Hellman (DBDH) assumption in the standard model. In our scheme, we employ a pair (ID, S) to identify a user, where ID denotes the identity of a user and S denotes the attribute set associated with her.
Highlights
With the advent of cloud computing, more and more data and computations will be migrated to the cloud
Goyal et al [4] presented the key policy attribute-based encryption (KP-ABE) scheme in which ciphertexts are associated with attribute sets and the private keys are associated with access structures
A T-ciphertext policy attribute-based encryption (CP-ABE) scheme is Dishonest User secure if no probabilistic polynomial time (PPT) attacker A has a non-negligible advantage in the following game: Init: The attacker A commits to a challenge identity ID? to the challenger
Summary
With the advent of cloud computing, more and more data and computations will be migrated to the cloud. Goyal et al [4] presented the key policy attribute-based encryption (KP-ABE) scheme in which ciphertexts are associated with attribute sets and the private keys are associated with access structures. While they proposed the CP-ABE scheme, they did not implement it. The ciphertexts are decrypted by the private keys iff the access structures are satisfied by the attribute sets They proved security in the generic group model. This construction builds on the ciphertext policy attribute-based encryption scheme presented by [9] In this scheme, a secure private key generation protocol is constructed.
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have