首页> 外文期刊>Information Forensics and Security, IEEE Transactions on >Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild
【24h】

Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild

机译:可追踪的CP-ABE:如何追踪在野外发现的解密设备

获取原文
获取原文并翻译 | 示例

摘要

In Ciphertext-policy attribute-based encrypt- ion (CP-ABE), ciphertexts are associated with access policies, which do not have to contain the identities of eligible receivers, and attributes are shared by multiple users. CP-ABE is useful for providing fine-grained access control on encrypted data. However, it also has a practicality concern that a malicious user, with his attributes shared with other users, might leak his decryption privilege as a decryption blackbox, for some financial gain or other incentives, as there is little risk of getting caught. There are two types of decryption blackboxes that reflect different practical scenarios. A key-like decryption blackbox is associated with an attribute set S and can decrypt ciphertexts with access policies satisfied by S. A policy-specific decryption blackbox is associated with an access policy A and can decrypt ciphertexts with A. Policy-specific decryption blackbox has weaker decryption capacity than key-like decryption blackbox, but tracing it is deemed to be more difficult. In the preliminary version (in CCS 2013) of this paper, we proposed a new CP-ABE scheme which is adaptively traceable against key-like decryption blackbox. The scheme has sublinear overhead, which is the most efficient one to date supporting fully collusion-resistant blackbox traceability. The scheme is fully secure in the standard model, and supports any monotonic access structures. In this paper, we further show that the scheme is also selectively traceable against policy-specific decryption blackbox. Furthermore, and more importantly, we prove a general statement that if a CP-ABE scheme is (selectively) traceable against policy-specific decryption blackbox, it is also (selectively) traceable against key-like decryption blackbox, which implies that we now only need to focus on building CP-ABE schemes which are traceable against policy-specific decryption blackbox.
机译:在基于密文策略的基于属性的加密(CP-ABE)中,密文与访问策略相关联,访问策略不必包含合格接收者的身份,并且属性由多个用户共享。 CP-ABE可用于提供对加密数据的细粒度访问控制。但是,还存在实用性问题,即与其他用户共享属性的恶意用户可能出于某种经济利益或其他诱因而泄漏其解密特权作为解密黑匣子,因为几乎没有被捕获的风险。有两种类型的解密黑匣子,它们反映了不同的实际情况。类似于密钥的解密黑盒与属性集S关联,并且可以使用S满足的访问策略对密文进行解密。特定于策略的解密黑盒与访问策略A相关联,并且可以使用A对密文进行解密。特定于策略的解密黑盒具有解密能力比类似密钥的解密黑匣子要弱,但要追踪它却更加困难。在本文的初始版本(在CCS 2013中)中,我们提出了一种新的CP-ABE方案,该方案可针对类似密钥的解密黑盒进行自适应跟踪。该方案具有次线性开销,这是迄今为止最有效的方案,支持完全抗串通的黑匣子可追溯性。该方案在标准模型中是完全安全的,并支持任何单调访问结构。在本文中,我们进一步表明,该方案还可以针对特定于策略的解密黑盒进行选择性跟踪。此外,更重要的是,我们证明了一条一般性声明:如果CP-ABE方案可(选择性地)针对特定于策略的解密黑匣子进行跟踪,那么它(也可选择性地)针对类似于密钥的解密黑匣子进行跟踪,这意味着我们现在仅需要专注于构建可针对特定于策略的解密黑盒进行追溯的CP-ABE方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号