Paper 2015/613

Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud

Jianting Ning, Xiaolei Dong, Zhenfu Cao, and Lifei Wei

Abstract

As a sophisticated mechanism for secure fine-grained access control, ciphertext-policy attribute-based encryption (CP-ABE) is a highly promising solution for commercial applications such as cloud computing. However, there still exists one major issue awaiting to be solved, that is, the prevention of key abuse. Most of the existing CP-ABE systems missed this critical functionality, hindering the wide utilization and commercial application of CP-ABE systems to date. In this paper, we address two practical problems about the key abuse of CP-ABE: (1) The key escrow problem of the semi-trusted authority; and, (2) The malicious key delegation problem of the users. For the semi-trusted authority, its misbehavior (i.e., illegal key (re-)distribution) should be caught and prosecuted. And for a user, his/her malicious behavior (i.e., illegal key sharing) need be traced. We affirmatively solve these two key abuse problems by proposing the first accountable authority CP-ABE with white-box traceability that supports policies expressed in any monotone access structures. Moreover, we provide an auditor to judge publicly whether a suspected user is guilty or is framed by the authority.

Note: 20th European Symposium on Research in Computer Security (ESORICS 2015)

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Minor revision. accepted by ESORICS 2015
Keywords
Attribute-Based EncryptionCiphertext-PolicyKey AbuseWhite-box TraceablityPublic Auditing
Contact author(s)
jtning @ sjtu edu cn
History
2015-07-01: revised
2015-06-30: received
See all versions
Short URL
https://ia.cr/2015/613
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/613,
      author = {Jianting Ning and Xiaolei Dong and Zhenfu Cao and Lifei Wei},
      title = {Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud},
      howpublished = {Cryptology ePrint Archive, Paper 2015/613},
      year = {2015},
      note = {\url{https://eprint.iacr.org/2015/613}},
      url = {https://eprint.iacr.org/2015/613}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.