4.4 Article

Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large UniverseaEuro

Journal

COMPUTER JOURNAL
Volume 59, Issue 7, Pages 983-1004

Publisher

OXFORD UNIV PRESS
DOI: 10.1093/comjnl/bxv101

Keywords

attribute-based encryption; traitor tracing; revocation; large attribute universe

Funding

  1. ASTRI, Hong Kong

Ask authors/readers for more resources

A blackbox traceable Attribute-Based Encryption (ABE) can identify a malicious user called traitor, which created a decryption box with respect to an attribute set (respectively, access policy), out of all the users who share the same attribute set (respectively, access policy). However, none of the existing traceable ABE schemes can also support revocation and large attribute universe, that is, being able to revoke compromised keys, and can take an exponentially large number of attributes. In this paper, we formalize the definitions and security models, and propose constructions of both Ciphertext-Policy ABE and Key-Policy ABE that support (i) public and fully collusion-resistant blackbox traceability, (ii) revocation, (iii) large universe and (iv) any monotonic access structures as policies (i.e. high expressivity). We also show that the schemes are secure and blackbox traceable in the standard model against selective adversaries.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available