Abstract

In order to solve the problem that the importance of the user’s attribute is seldom considered in the most of the existing attribute-based encryption schemes with traitor tracing, we designed a traceable and weighted attribute-based encryption scheme. In our constructed scheme, the private key of the user consisting of user’s identity information is applied to trace traitors. In addition, the idea of weighted attribute is introduced, and the attributes set is transformed into the segmentation set of weighted attributes through the attributes set segmentation algorithm. Via employing a linear secret sharing scheme, the constructed scheme offers fine-grained and nimble access control mechanism. Under the assumption of q-BDHE in the standard model, we prove that the designed scheme is able to reach security against chosen-plaintext attack. By comparing with other relevant schemes, it has significant improvement in the costs of communication and computation, and it is more suitable for the application of the mobile terminal in cloud computing.

Highlights

  • One-to-many encryption pattern can be achieved by the system of attribute-based encryption (ABE) via fine-grained access control

  • Based on the comprehensive analysis of the existing ciphertext-policy attribute-based encryption (CP-ABE) scheme, we find that many researchers pay attention to tracing malicious users and weighted attributes independently

  • COMPLEXITY ASSUMPTIONS We offer the assumption of l-Strong Diffie-Hellman (l-SDH) and present the assumption of q-Bilinear Diffie-Hellman Exponent (q-BDHE)

Read more

Summary

INTRODUCTION

One-to-many encryption pattern can be achieved by the system of attribute-based encryption (ABE) via fine-grained access control. Among the scheme of CP-ABE, the attributes set is in relation to the private key of the user, along with the access strategy has relation to the ciphertext of the data. Wang et al [13] offered an ABE scheme that could trace traitors based on identified users In their scheme, a secure coding technique was introduced to guarantee the identity of abusers of the key. For the sake of boosting the expressive capability of the access strategy, Liu et al [14] constructed a CP-ABE scheme that holds traceable and contents any monotonic access structure In their scheme, a signature technique was used to generate identity information so that the CP-ABE system can trace malevolent users.

ACCESS STRUCTURE Definition 1
TRACEABILITY
KEY SANITY CHECK
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call