Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority

نویسندگان

  • Huang Lin
  • Zhenfu Cao
  • Xiaohui Liang
  • Jun Shao
چکیده

An attribute based encryption scheme (ABE) is a cryptographic primitive in which every user is identified by a set of attributes, and some function of these attributes is used to determine the ability to decrypt each ciphertext. Chase proposed the first multi authority ABE scheme in TCC 2007 as an answer to an open problem presented by Sahai and Waters in EUROCRYPT 2005. However, her scheme needs a fully trusted central authority which can decrypt every ciphertext in the system. This central authority would endanger the whole system if it’s corrupted. This paper presents a threshold multi authority fuzzy identity based encryption(MA-FIBE) scheme without a central authority for the first time. An encrypter can encrypt a message such that a user could only decrypt if he has at least dk of the given attributes about the message for at least t + 1, t ≤ n/2 honest authorities of all the n attribute authorities in the proposed scheme. This paper considers a stronger adversary model in the sense that the corrupted authorities are allowed to distribute incorrect secret keys to the users. The security proof is based on the secrecy of the underlying joint random secret sharing protocol and joint zero secret sharing protocol and the standard decisional bilinear Diffie-Hellman assumption. The proposed MA-FIBE could be extended to the threshold multi authority attribute based encryption (MA-ABE) scheme, and two secure MA-ABE schemes without a central authority are also presented in this paper. Moreover, some extensions about the proposed MA-ABE schemes, such as how to convert a large universe MA-ABE scheme into a proactive scheme, are also provided in this paper.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles

Recently Lewko and Waters proposed the first fully secure multi-authority ciphertext-policy attribute-based encryption (CP-ABE) system in the random oracle model, and leave the construction of a fully secure multi-authority CP-ABE in the standard model as an open problem. Also, there is no CP-ABE system which can completely prevent individual authorities from decrypting ciphertexts. In this tal...

متن کامل

Multi-authority attribute-based encryption with honest-but-curious central authority

An attribute based encryption scheme capable of handling multiple authorities was recently proposed by Chase. The scheme is built upon a single-authority attribute based encryption scheme presented earlier by Sahai and Waters. Chase’s construction uses a trusted central authority that is inherently capable of decrypting arbitrary ciphertexts created within the system. We present a multi-authori...

متن کامل

An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext

Decentralizing attribute based encryption is a variant of multi-authority attribute based encryption which doesn’t require a trusted central authority to conduct the system setup. In this paper, we propose an expressive decentralizing KP-ABE scheme with constant ciphertext size. In our construction, the access policy can be expressed as any non-monotone access structure. Meanwhile, the cipherte...

متن کامل

Outsourcing Decryption of Multi-Authority ABE Ciphertexts

The notion of multi-authority attribute based encryption was introduced by Chase in TCC 2007. In this paper, we improve Chase’s scheme to allow encryptors to determine how many attributes are required for each ciphertext from related attribute authorities. The proposed scheme can be seen as a multi-trapdoor construction. Furthermore, we apply the LMSSS to outsource the decryption of multi-autho...

متن کامل

Secure Attribute-based Threshold Signature without a Trusted Central Authority

Currently, in most attribute-based cryptosystem, the central authority that distributes private keys for attributes assigned to the user must be trusted unconditionally otherwise the systems will soon be collapsed. To solve the problem we propose a new attributebased threshold signature scheme without a trusted central authority. When the number of user’s attributes reaches the threshold he can...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Inf. Sci.

دوره 180  شماره 

صفحات  -

تاریخ انتشار 2008