Abstract
We present an accountable authority key policy attribute-based encryption (A-KPABE) scheme. In this paper, we extend Goyal’s work to key policy attribute-based encryption setting. We first generalize the notion of accountable authority in key policy attribute-based encryption scenario, and then give a construction. In addition, our scheme is shown to be secure in the standard model under the modified Bilinear Decisional Diffie-Hellman (mBDDH) assumption.
Similar content being viewed by others
References
Sahai A, Waters B. Fuzzy identity based encryption. In: Proceedings of EUROCRYPT’05. LNCS, 3494. Berlin: Springer, 2005. 457–473
Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM Press, 2006. 89–98
Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In: Proceedings of 2007 IEEE Symposium on Security and Privacy. Washington: IEEE Computer Society, 2007. 321–334
Cheung L, Newport C. Porvably secure ciphertext policy ABE. In: Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM Press, 2007. 456–465
Waters B. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Cryptology ePrint Archive, Report 2008/290
Attrapadung N, Imai H. Dual-policy attribute based encryption. In: Applied Cryptography and Network Security. LNCS, 5536. Berlin: Springer, 2009. 168–185
Lewko A, Okamoto T, Sahai A, et al. Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Proceedings of EUROCRYPT 2010. LNCS, 6110. Berlin: Springer, 2010. 62–91
Shamir A. Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO 1984. LNCS, 196. Berlin: Springer, 1984. 47–53
Boneh D, Franklin M. Identity based encryption from the Weil pairing. In: Proceedings of CRYPTO’01. LNCS, 2139. Berlin: Springer, 2001. 213–229
Waters B. Efficient identity-based encryption without random oracles. In: Proceedings of EUROCRYPT’05. LNCS, 3494. Berlin: Springer, 2005. 114–127
Goyal V. Reducing trust in the PKG in identity based cryptosystems. In: Proceedings of CRYPTO’07. LNCS, 4622. Berlin: Springer, 2007. 430–447
Gentry C. Practical identity-based encryption without random oracles. In: Proceedings of EUROCRYPT’06. LNCS, 4004. Berlin: Springer, 2006. 445–464
Goyal V, Lu S, Sahai A, et al. Black-box accountable authority identity-based encryption. In: Proceedings of the 15th ACM Conference on Computer and Communications Security. New York: ACM Press, 2008. 427–436
Au M H, Huang Q, Liu J K, et al. Traceable and retrievable identity-based encryption. In: Applied Cryptography and Network Security-ACNS’08. LNCS, 5037. Berlin: Springer, 2008. 94–110
Libert B, Vergnaud D. Towards black-box accountable authority IBE with short ciphertexts and private keys. In: Proceedings of PKC’09. LNCS, 5443. Berlin: Springer, 2009. 235–255
Li J, Ren K, Kim K. A2BE: accountable attribute-based encryption for abuse free access control. Cryptology ePrint Archive, Report 2009/118
Yu S, Ren K, Lou W, et al. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Proceedings of SecureComm 2009. Berlin: Springer, 2009. 311–329
Kiltz E, Vahlis Y. CCA2 Secure IBE: standard model efficiency through authenticated symmetric encryption. In: Proceedings of CT-RSA’08. LNCS, 4964. Berlin: Springer, 2008. 221–238
Okamoto T. Provably secure and practical identification schemes and corresponding signature schemes. In: Proceedings of CRYPTO 1992. LNCS, 740. Berlin: Springer, 1993. 31–53
Pedersen T P. Non-interactive and information-theoretic secure verifiable secret sharing. In: Proceedings of CRYPTO 1991. LNCS, 576. Berlin: Springer, 1992. 129–140
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, Y., Chen, K., Long, Y. et al. Accountable authority key policy attribute-based encryption. Sci. China Inf. Sci. 55, 1631–1638 (2012). https://doi.org/10.1007/s11432-012-4594-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11432-012-4594-7