loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Xiaoyi Li 1 ; Kaitai Liang 2 ; Zhen Liu 1 and Duncan Wong 1

Affiliations: 1 Hong Kong Applied Science and Technology Research Institute, Hong Kong ; 2 Manchester Metropolitan University, United Kingdom

Keyword(s): Traitor Tracing, Revocation, Ciphertext-policy Attribute based Encryption, Prime Order Groups.

Abstract: A Ciphertext-Policy Attribute-Based Encryption (CP-ABE) allows users to specify the access policies without having to know the identities of users. In this paper, we contribute by proposing an ABE scheme which enables revoking corrupted users. Given a key-like blackbox, our system can identify at least one of the users whose key must have been used to construct the blackbox and can revoke the key from the system. This paper extends the work of Liu and Wong to achieve traitor revocability. We construct an Augmented Revocable CPABE (AugR-CP-ABE) scheme, and describe its security by message-hiding and index-hiding games. Then we prove that an AugR-CP-ABE scheme with message-hiding and index-hiding properties can be transferred to a secure Revocable CP-ABE with fully collusion-resistant blackbox traceability. In the proof for index-hiding, we divide the adversary’s behaviors in two ways and build direct reductions that use adversary to solve the D3DH problem. Our scheme achieves the sub-linear overhead of O(√N), where N is the number of users in the system. This scheme is highly expressive and can take any monotonic access structures as ciphertext policies. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.143.0.157

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Li, X.; Liang, K.; Liu, Z. and Wong, D. (2017). Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups. In Proceedings of the 7th International Conference on Cloud Computing and Services Science - CLOSER; ISBN 978-989-758-243-1; ISSN 2184-5042, SciTePress, pages 309-320. DOI: 10.5220/0006220203090320

@conference{closer17,
author={Xiaoyi Li. and Kaitai Liang. and Zhen Liu. and Duncan Wong.},
title={Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups},
booktitle={Proceedings of the 7th International Conference on Cloud Computing and Services Science - CLOSER},
year={2017},
pages={309-320},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006220203090320},
isbn={978-989-758-243-1},
issn={2184-5042},
}

TY - CONF

JO - Proceedings of the 7th International Conference on Cloud Computing and Services Science - CLOSER
TI - Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups
SN - 978-989-758-243-1
IS - 2184-5042
AU - Li, X.
AU - Liang, K.
AU - Liu, Z.
AU - Wong, D.
PY - 2017
SP - 309
EP - 320
DO - 10.5220/0006220203090320
PB - SciTePress