skip to main content
10.1145/1966913.1966964acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
short-paper

Multi-authority ciphertext-policy attribute-based encryption with accountability

Published:22 March 2011Publication History

ABSTRACT

Attribute-based encryption (ABE) is a promising tool for implementing fine-grained cryptographic access control. Very recently, motivated by reducing the trust assumption on the authority, and enhancing the privacy of users, a multiple-authority key-policy ABE system, together with a semi-generic anonymous key-issuing protocol, have been proposed by Chase and Chow in CCS 2009. Since ABE allows encryption for multiple users with attributes satisfying the same policy, it may not be always possible to associate a decryption key to a particular individual. A misbehaving user could abuse the anonymity by leaking the key to someone else, without worrying of being traced. In this paper, we propose a multi-authority ciphertext-policy (AND gates with wildcard) ABE scheme with accountability, which allows tracing the identity of a misbehaving user who leaked the decryption key to others, and thus reduces the trust assumptions not only on the authorities but also the users. The tracing process is efficient and its computational overhead is only proportional to the length of the identity.

References

  1. M. Abdalla, D. Catalano, A. W. Dent, J. Malone-Lee, G. Neven, and N. P. Smart. Identity-Based Encryption Gone Wild. In ICALP, volume 4052 of LNCS, pages 300--311, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy, pages 321--334, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Chase. Multi-Authority Attribute Based Encryption. In TCC, volume 4392 of LNCS, pages 515--534, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Chase and S. S. M. Chow. Improving Privacy and Security in Multi-Authority Attribute-Based Encryption. In ACM CCS, pages 121--130, New York, NY, USA, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. L. Cheung and C. Newport. Provably Secure Ciphertext Policy ABE. In ACM CCS, pages 456--465, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. S. M. Chow. New Privacy-Preserving Architectures for Identity-/Attribute-based Encryption. PhD thesis, New York University, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. In ACM CCS, pages 89--98, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. J. Hinek, S. Jiang, R. Safavi-Naini, and S. F. Shahandashti. Attribute-Based Encryption with Key Cloning Protection. Cryptology ePrint 2008/478.Google ScholarGoogle Scholar
  9. J. Li and K. Kim. Hidden Attribute-Based Signatures without Anonymity Revocation. Inf. Sci., 180(9):1681--1689, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Li, K. Ren, and K. Kim. A 2 BE: Accountable Attribute-Based Encryption for Abuse Free Access Control. Cryptology ePrint 2009/118, 2009.Google ScholarGoogle Scholar
  11. J. Li, K. Ren, B. Zhu, and Z. Wan. Privacy-Aware Attribute-Based Encryption with User Accountability. In ISC, volume 5735 of LNCS, pages 347--362, 2009. Full version available at http://eprint.iacr.org/2009/284. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. T. Nishide, K. Yoneyama, and K. Ohta. Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structure. In ACNS, volume 5037 of LNCS, pages 111--129, 2008. Journal version appeared in IEICE Transactions 92-A(1): 22--32 (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Sahai and B. Waters. Fuzzy Identity-Based Encryption. In EUROCRYPT, volume 3494 of LNCS, pages 457--473, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S. Yu, K. Ren, W. Lou, and J. Li. Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. In SECURECOMM, 2009. Full version available at http://eprint.iacr.org/2009/295.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Multi-authority ciphertext-policy attribute-based encryption with accountability

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ASIACCS '11: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
        March 2011
        527 pages
        ISBN:9781450305648
        DOI:10.1145/1966913

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 22 March 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper

        Acceptance Rates

        ASIACCS '11 Paper Acceptance Rate35of217submissions,16%Overall Acceptance Rate418of2,322submissions,18%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader