Abstract:
The fine grain of ciphertext-policy attribute-based encryption (CP-ABE) offers advantages through the amalgamation of key and user attributes; however, it also brings the...Show MoreMetadata
Abstract:
The fine grain of ciphertext-policy attribute-based encryption (CP-ABE) offers advantages through the amalgamation of key and user attributes; however, it also brings the issue of key misuse. To circumvent the tracking mechanisms of the white-box algorithm, malicious users manipulate the decryption key and encryption algorithm, encapsulating them to create a black-box decryption device. This necessitates black-box traceability for supervision purposes. In this article, we employ n -bit encrypted binary vectors to depict the user’s identity and subsequently convert it into partial decryption privileges. When encrypting plaintext, data owners can utilize a “vague specification” to define the identity vector of qualified decryptors. Furthermore, based on the vague specification mechanism, we have devised a pioneering active black-box tracing algorithm. Integrating this algorithm with CP-ABE, we propose the black-box traceable CP-ABE (EIV-BT-ABE) scheme. Our EIV-BT-ABE scheme attains strong traceability with low time complexity, effectively reducing decryption and encryption time costs. The experiment substantiated the efficiency of our scheme while demonstrating its adherence to IND-CPA security.
Published in: IEEE Internet of Things Journal ( Volume: 11, Issue: 9, 01 May 2024)