首页> 外文会议>European Symposium on Research in Computer Security >Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently
【24h】

Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently

机译:短期密文可追溯CP-ABE:如何捕获人们在eBay上销售解密设备

获取原文

摘要

Ciphertext-policy attribute-based encryption (CP-ABE) is a highly promising solution for cloud computing, which has been widely applied to provide fine-grained access control in cloud storage services recently. However, for CP-ABE based cloud storage systems, if a decryption device appears on eBay described and advertised to be able to decrypt any ciphertexts with policies satisfied by an attribute set or even with a specific access policy only, no one can trace the malicious user(s) who built such a decryption device using their private key(s). This has been known as a major obstacle to deploying CP-ABE systems in real-world commercial applications. Due to the one-to-many encryption mechanism of CP-ABE, the same decryption privilege is shared by multiple users who have the same attributes. It is difficult to identity the malicious user(s) who built such a decryption device. To track people selling decryption devices on eBay efficiently, in this paper, we develop a new methodology for constructing traitor tracing functionality, and present the first black-box traceable CP-ABE (BT-CP-ABE) with short cipher-texts which are independent of the number of users N. The black-box traceability is public, fully collusion-resistant, and adaptively traceable against both key-like decryption black-box and policy-specific decryption black-box. Our construction combines the conventional CP-ABE with Anonymous Hierarchical Identity-Based Encryption (A-HIBE) in a novel way, which is the first to construct the (underlying) traitor tracing system from A-HIBE. The resulting ciphertexts are independent of N while the private keys are linear in N, which partially answers an open problem posed by Boneh and Waters [CCS 2006]. We believe this work is a constructive step towards efficient traitor tracing system with short cipher-texts and private keys. In particular, we believe that following the route of this work, any progress in A-HIBE (i.e., with shorter ciphertexts and private keys) may result in some progress in BT-CP-ABE and finally give a satisfactory solution to this open problem.
机译:基于密文 - 策略的加密(CP-ABE)是一个高度有希望的云计算解决方案,它已被广泛应用于最近在云存储服务中提供细粒度的访问控制。但是,对于基于CP-abe的云存储系统,如果解密设备将在eBay上显示并宣传,以便能够使用属性集合满足的策略(仅限特定的访问策略)解密任何密文,甚至只能追踪恶意使用其私钥构建此类解密设备的用户。这被称为在现实世界商业应用中部署CP-ABE系统的主要障碍。由于CP-ABE的一对多加密机制,相同的解密权限由具有相同属性的多个用户共享。难以识别构建这种解密设备的恶意用户。要跟踪eBay上的销售解密设备的人,在本文中,我们开发了一种构建叛徒追踪功能的新方法,并介绍了具有短密文的第一个黑匣子可追踪CP-ABE(BT-CP-ABE)独立于用户数N.黑匣子可追溯性是公共,完全抗菌性的,并适应性地追溯到钥匙式解密黑匣子和政策特定的解密黑匣子。我们的施工将传统的CP-ABE与基于匿名的分层身份的加密(A-HIBE)相结合,这是第一个构建来自A-HIBE的(底层)追踪系统的加密系统。由此产生的密文与n无关,而私钥在n中线性,这部分地应答由Boneh和Waters构成的打开问题[CCS 2006]。我们认为这项工作是迈向具有短密钥和私钥的高效追踪追踪系统的建设性步骤。特别是,我们认为,在这项工作的路线之后,a-hibe中的任何进展都可能导致bt-cp-abe中的一些进展,并且最终会对这一打开问题提供令人满意的解决方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号