Abstract
Decentralized attribute-based encryption (DABE) is an efficient multi-authority attribute-based encryption system. But most of the available are shown there are security vulnerabilities. How to construct secure DABE is still a challenging problem at present. In this paper, based on Lewko and Waters’s scheme, a decentralized attribute-based encryption with preserving the privacy of the identifies and attributes in access structure is proposed. The presented scheme keeps the security of the original one and removes the random oracle. In addition, the proposed scheme achieves the user collusion avoidance. Finally, we show that the security of the proposed scheme is reduced to static assumptions based on dual system encryption instead of other strong assumptions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bethencourt, J, Sahai, A, Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334 (2007)
Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)
Ostrovksy, R., Sahai, A., Waters, B.: Attribute based encryption with non monotonic access structures. In: ACM Conference on Computer and Communications Security, pp. 195–203. ACM (2007)
Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008. LNCS, vol. 5126, pp. 579–591. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-70583-3_47
Ling, C., Newport, C.: Provably secure ciphertext policy ABE. In: ACM Conference on Computer and Communications Security, pp. 456–465. ACM (2007)
Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515–534. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-70936-7_28
Chase, M., Chow, S.S.M.: Improving privacy and security in multi-authority attribute-based encryption. In: ACM Conference on Computer and Communications Security, pp. 121–130. ACM (2009)
Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19379-8_4
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_4
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27
Li, J., Huang, Q., Chen, X., et al.: Multi-authority ciphertext-policy attribute-based encryption with accountability. In: ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, pp. 386–390. ACM, Hong Kong (2011)
Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568–588. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20465-4_31
Han, J., Susilo, W., Mu, Y., et al.: Privacy-preserving decentralized key-policy attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 23(11), 2150–2162 (2012)
Ge, A., Zhang, J., Zhang, R., et al.: Security analysis of a privacy-preserving decentralized key-policy attribute-based encryption scheme. IEEE Trans. Parallel Distrib. Syst. 24(11), 2319–2321 (2013)
Qian, H., Li, J., Zhang, Y.: Privacy-preserving decentralized ciphertext-policy attribute-based encryption with fully hidden access structure. In: Qing, S., Zhou, J., Liu, D. (eds.) ICICS 2013. LNCS, vol. 8233, pp. 363–372. Springer, Cham (2013). https://doi.org/10.1007/978-3-319-02726-5_26
Rahulamathavan, Y., Veluru, S., Han, J., et al.: User collusion avoidance scheme for privacy-preserving decentralized key-policy attribute-based encryption. IEEE Trans. Comput. 65(9), 2939–2946 (2016)
Han, J., Susilo, W., Mu, Y., Zhou, J., Au, M.H.: PPDCP-ABE: privacy-preserving decentralized ciphertext-policy attribute-based encryption. In: Kutyłowski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8713, pp. 73–90. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11212-1_5
Wang, M., Zhang, Z., Chen, C.: Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme. Concurrency Comput.: Practice Exp. 28(4), 1237–1245 (2016)
Zhang, L., Liang, P., Mu, Y.: Improving privacy-preserving and security for decentralized key-policy attributed-based encryption. IEEE Access 6, 12736–12745 (2018)
Zhong, H., Zhu, W., Xu, Y., et al.: Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput. 22(1), 1–9 (2016)
Shao, J., Zhu, Y., Ji, Q.: Privacy-preserving online/offline and outsourced multi-authority attribute-based encryption. In: International Conference on Computer and Information Science, pp. 285–291. IEEE (2017)
Li, Q., Ma, J., Li, R., et al.: Large universe decentralized key-policy attribute-based encryption. Secur. Commun. Netw. 8(3), 501–509 (2015)
Li, Q., Ma, J., Li, R., et al.: Secure, efficient and revocable multi-authority access control system in cloud storage. Comput. Secur. 59(C), 45–59 (2016)
Acknowledgment
This work was supported in part by the National Cryptography Development Fund of China under Grant MMJJ20180209.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Liang, P., Zhang, L., Shang, Y. (2018). Novel Secure Privacy-Preserving Decentralized Attribute-Based Encryption. In: Li, F., Takagi, T., Xu, C., Zhang, X. (eds) Frontiers in Cyber Security. FCS 2018. Communications in Computer and Information Science, vol 879. Springer, Singapore. https://doi.org/10.1007/978-981-13-3095-7_6
Download citation
DOI: https://doi.org/10.1007/978-981-13-3095-7_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3094-0
Online ISBN: 978-981-13-3095-7
eBook Packages: Computer ScienceComputer Science (R0)