Mitigating Key Escrow in Attribute-Based Encryption
نویسندگان
چکیده
The notion of accountable authority introduced by Goyal (Crypto 2007) in identity-based encryption (IBE) setting is a novel approach to mitigate the (inherent) key escrow problem in identity based cryptosystems. As far as we know, the (inherent) key escrow problem also exists in attribute based encryption (ABE), for example ciphertext policy ABE (CP-ABE). In this paper, the concept of accountable authority is generalized to ABE setting. We first formalize the definitions and security models for accountable authority attribute-based encryption (AABE), and then present two concrete constructions. One is designed for the threshold ABE with large universe attributes, and the other is built for ciphertext policy ABE. In our scheme, a user will be identified by a pair (id, ω), where id denotes the identity of a user and ω denotes a attribute set associated to the user. In addition, both constructions are shown to be secure in the standard model under some reasonable assumptions.
منابع مشابه
New Privacy-Preserving Architectures for Identity-/Attribute-based Encryption
The notion of identity-based encryption (IBE) was proposed as an economical alternative to public-key infrastructures. IBE is also a useful building block in various cryptographic primitives such as searchable encryption. A generalization of IBE is attribute-based encryption (ABE). A major application of ABE is fine-grained cryptographic access control of data. Research on these topics is still...
متن کاملAttribute-Based Certificateless Cryptographic System
As an extension of identity-based encryption scheme, attribute-based encryption scheme also has the key escrow problem. Multi-authority attribute-based encryption schemes are principal solution, but it is at the cost of the introducing extra infrastructure and communication. This paper introduces the concept of attribute-based certificatless encryption system (ABCE), which is a new approach to ...
متن کاملRemoving Escrow from Identity-Based Encryption New Security Notions and Key Management Techniques
Key escrow is inherent in identity-based encryption (IBE). A curious key generation center (KGC) can simply generate the user’s private key to decrypt a ciphertext. However, can a KGC still decrypt if it does not know the intended recipient of the ciphertext? We answer by formalizing KGC anonymous ciphertext indistinguishability (ACI −KGC). We find that all existing pairing-based IBE schemes wi...
متن کاملA Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow
With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced e...
متن کاملData Sharing using Key Policy based Authentication & CHAP
Data Sharing between number of users whether in distributed systems or in cloud environment needs security from various attacks. Attribute based data sharing is also an efficient technique which provides Cipher text policy attribute-based encryption from the prevention from key escrow problem and user revocation [1]. Although the technique is efficient but further enhancements is needed for the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 17 شماره
صفحات -
تاریخ انتشار 2015