4.6 Article

A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection

Journal

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2020.2977646

Keywords

Encryption; Binary trees; Privacy; Cloud computing; Access control; Binary tree; CP-ABE; hidden policy; revocation; traceability

Funding

  1. National Natural Science Foundation of China [61672338, 61873160]

Ask authors/readers for more resources

The proposed CP-ABE scheme in this article achieves revocation, white-box traceability, and the application of hidden policy. The ciphertext is composed of two parts: the access policy encrypted by attribute value and the revocation information related to a binary tree. The scheme is proven to be IND-CPA secure, efficient, and promising in the standard model.
Considered as a promising fine-grained access control mechanism for data sharing without a centralized trusted third-party, the access policy in a plaintext form may reveal sensitive information in the traditional CP-ABE method. To address this issue, a hidden policy needs to be applied to the CP-ABE scheme, as the identity of a user cannot be accurately confirmed when the decryption key is leaked, so the malicious user is traced and revoked as demanded. In this article, a CP-ABE scheme that realizes revocation, white-box traceability, and the application of hidden policy is proposed, and such ciphertext is composed of two parts. One is related to the access policy encrypted by the attribute value, and only the attribute name is evident in the access policy. Another is related to the revocation information and updated when revoking, where the revocation information is generated by the binary tree related to users. The leaf node value of a binary tree in the decryption key is used to trace the malicious user. From experimental results, it is shown that the proposed scheme is proven to be IND-CPA secure under the chosen plaintext attacks and selective access policy based on the decisional q-BDHE assumption in the standard model, efficient, and promising.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available