proved its message-hiding and index-hiding proper-
ties in the standard model. This CP-ABE achieves
full security in the standard model on prime order
groups. Our contributions are (1) adding the revoca-
tion list, and (2) proving its full security with revoca-
bility. We follow the proof method in (Liu and Wong,
2015b) for message-hiding, and build two direct re-
ductions for the proof for index-hiding. The scheme
is a fully collusion-resistantblackbox traceable R-CP-
ABE scheme. It achieves the most efficient level to
date, with overhead in O(
√
N) only.
REFERENCES
Attrapadung, N. and Imai, H. (2009). Conjunctive broadcast
and attribute-based encryption. In Pairing, pages 248–
265.
Bethencourt, J., Sahai, A., and Waters, B. (2007).
Ciphertext-policy attribute-based encryption. In IEEE
Symposium on Security and Privacy, pages 321–334.
Cheung, L. and Newport, C. C. (2007). Provably secure
ciphertext policy ABE. In ACM Conference on Com-
puter and Communications Security, pages 456–465.
Deng, H., Wu, Q., Qin, B., Mao, J., Liu, X., Zhang, L.,
and Shi, W. (2014). Who is touching my cloud. In
ESORICS, Part I, pages 362–379.
Garg, S., Kumarasubramanian, A., Sahai, A., and Waters,
B. (2010). Building efficient fully collusion-resilient
traitor tracing and revocation schemes. In ACM Con-
ference on Computer and Communications Security,
pages 121–130.
Goyal, V., Jain, A., Pandey, O., and Sahai, A. (2008).
Bounded ciphertext policy attribute based encryption.
In ICALP (2), pages 579–591.
Herranz, J., Laguillaumie, F., and R`afols, C. (2010). Con-
stant size ciphertexts in threshold attribute-based en-
cryption. In Public Key Cryptography, pages 19–34.
Lewko, A. B. (2012). Tools for simulating features of com-
posite order bilinear groups in the prime order setting.
In EUROCRYPT, pages 318–335.
Lewko, A. B., Okamoto, T., Sahai, A., Takashima, K., and
Waters, B. (2010). Fully secure functional encryp-
tion: Attribute-based encryption and (hierarchical) in-
ner product encryption. In EUROCRYPT, pages 62–
91.
Lewko, A. B. and Waters, B. (2012a). New proof methods
for attribute-based encryption: Achieving full security
through selective techniques. In CRYPTO, pages 180–
198.
Lewko, A. B. and Waters, B. (2012b). New proof methods
for attribute-based encryption: Achieving full security
through selective techniques. IACR Cryptology ePrint
Archive, 2012:326.
Li, X., Liang, K., Liu, Z., and Wong, D. S. (2016). At-
tribute based encryption: Traitor tracing, revocation
and fully security on prime order groups. IACR Cryp-
tology ePrint Archive, 2016:1140.
Liu, Z., Cao, Z., and Wong, D. S. (2013a). Blackbox trace-
able CP-ABE: how to catch people leaking their keys
by selling decryption devices on ebay. In ACM Con-
ference on Computer and Communications Security,
pages 475–486.
Liu, Z., Cao, Z., and Wong, D. S. (2013b). White-box
traceable ciphertext-policy attribute-based encryption
supporting any monotone access structures. IEEE
Transactions on Information Forensics and Security,
8(1):76–88.
Liu, Z. and Wong, D. S. (2015a). Practical ciphertext-policy
attribute-based encryption: Traitor tracing, revoca-
tion, and large universe. In Malkin, T., Kolesnikov,
V., Lewko, A. B., and Polychronakis, M., editors, Ap-
plied Cryptography and Network Security - 13th Inter-
national Conference, ACNS 2015, New York, NY, USA,
June 2-5, 2015, Revised Selected Papers, volume 9092
of Lecture Notes in Computer Science, pages 127–
146. Springer.
Liu, Z. and Wong, D. S. (2015b). Traceable CP-ABE on
prime order groups: Fully secure and fully collusion-
resistant blackbox traceable. In Qing, S., Okamoto,
E., Kim, K., and Liu, D., editors, Information and
Communications Security - 17th International Con-
ference, ICICS 2015, Beijing, China, December 9-
11, 2015, Revised Selected Papers, volume 9543 of
Lecture Notes in Computer Science, pages 109–124.
Springer.
Okamoto, T. and Takashima, K. (2008). Homomorphic en-
cryption and signatures from vector decomposition. In
Pairing, pages 57–74.
Okamoto, T. and Takashima, K. (2009). Hierarchical pred-
icate encryption for inner-products. In ASIACRYPT,
pages 214–231.
Okamoto, T. and Takashima, K. (2010). Fully secure func-
tional encryption with general relations from the deci-
sional linear assumption. In CRYPTO, pages 191–208.
Rouselakis, Y. and Waters, B. (2013). Practical con-
structions and new proof methods for large universe
attribute-based encryption. In ACM Conference on
Computer and Communications Security, pages 463–
474.
Sahai, A., Seyalioglu, H., and Waters, B. (2012). Dynamic
credentials and ciphertext delegation for attribute-
based encryption. In CRYPTO, pages 199–217.
Sahai, A. and Waters, B. (2005). Fuzzy identity-based en-
cryption. In EUROCRYPT, pages 457–473.
Waters, B. (2011). Ciphertext-policy attribute-based en-
cryption: An expressive, efficient, and provably se-
cure realization. In Public Key Cryptography, pages
53–70.