Multi-authority Attribute Based Encryption
نویسنده
چکیده
In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in which each user is identified by a set of attributes, and some function of those attributes is used to determine decryption ability for each ciphertext. Sahai and Waters introduced a single authority attribute encryption scheme and left open the question of whether a scheme could be constructed in which multiple authorities were allowed to distribute attributes [SW05]. We answer this question in
منابع مشابه
Outsourcing Decryption of Multi-Authority ABE Ciphertexts
The notion of multi-authority attribute based encryption was introduced by Chase in TCC 2007. In this paper, we improve Chase’s scheme to allow encryptors to determine how many attributes are required for each ciphertext from related attribute authorities. The proposed scheme can be seen as a multi-trapdoor construction. Furthermore, we apply the LMSSS to outsource the decryption of multi-autho...
متن کاملUser Revocation Based Anonymous Access Provision for Efficient Cloud User Privacy
Cloud computing is a recent technology provides a flexible, on-demand and low cost feature of computing resources. The Main issue in Cloud Computing is user identity privacy and data content privacy. The User Privacy in Cloud Computing is achieved by various data access control Schemes. Existing Fully Anonymous Access control scheme with decentralized attribute authority provides data content p...
متن کاملA Lterature Survey on Revocable Multiauthority Cipher Text-policy Attribute-based Encryption (cp-abe) Scheme for Cloud Storage
In a Cloud Computing the data security achieved by Data Access Control Scheme. Cipher text-Policy Attribute-based Encryption (CP-ABE) is considered as one of the most suitable scheme for data access control in cloud storage. This scheme provides data owners more direct control on access policies. However, CP-ABE schemes to data access control for cloud storage systems are difficult because of t...
متن کاملMulti-authority attribute-based encryption with honest-but-curious central authority
An attribute based encryption scheme capable of handling multiple authorities was recently proposed by Chase. The scheme is built upon a single-authority attribute based encryption scheme presented earlier by Sahai and Waters. Chase’s construction uses a trusted central authority that is inherently capable of decrypting arbitrary ciphertexts created within the system. We present a multi-authori...
متن کاملAn Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext
Decentralizing attribute based encryption is a variant of multi-authority attribute based encryption which doesn’t require a trusted central authority to conduct the system setup. In this paper, we propose an expressive decentralizing KP-ABE scheme with constant ciphertext size. In our construction, the access policy can be expressed as any non-monotone access structure. Meanwhile, the cipherte...
متن کاملFully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles
Recently Lewko and Waters proposed the first fully secure multi-authority ciphertext-policy attribute-based encryption (CP-ABE) system in the random oracle model, and leave the construction of a fully secure multi-authority CP-ABE in the standard model as an open problem. Also, there is no CP-ABE system which can completely prevent individual authorities from decrypting ciphertexts. In this tal...
متن کامل