Secure threshold multi authority attribute based encryption without a central authority

被引:101
作者
Lin, Huang [1 ]
Cao, Zhenfu [1 ]
Liang, Xiaohui [1 ]
Shao, Jun [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
Threshold multi authority ABE; Without a central authority; PROTOCOL;
D O I
10.1016/j.ins.2010.03.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An attribute based encryption scheme (ABE) is a cryptographic primitive in which every user is identified by a set of attributes, and some function of these attributes is used to determine the ability to decrypt each ciphertext. Chase proposed the first multi authority ABE scheme which requires a fully trusted central authority who has the ability to decrypt each ciphertext in the system. This central authority would endanger the whole system if it is corrupted. This paper provides a threshold multi authority fuzzy identity based encryption (MA-FIBE) scheme without a central authority for the first time. An encrypter can encrypt a message such that a user could only decrypt if he has at least d(k) of the given attributes about the message for at least t + 1, t <= n/2 honest authorities of all the n attribute authorities in the proposed scheme. This paper considers a stronger adversary model in the sense that the corrupted authorities are allowed to distribute incorrect secret keys to the users. The security proof is based on the secrecy of the underlying distributed key generation protocol and joint zero secret sharing protocol and the standard decisional bilinear Diffie-Hellman assumption. The proposed MA-FIBE could be extended to the threshold multi authority attribute based encryption (MA-ABE) scheme, and both key policy based and ciphertext policy based MA-ABE schemes without a central authority are presented in this paper. Moreover, several other extensions, such as a proactive large universe MA-ABE scheme, are also provided in this paper. (C) 2010 Elsevier Inc. All rights reserved.
引用
收藏
页码:2618 / 2632
页数:15
相关论文
共 22 条
  • [1] [Anonymous], EUROCRYPT 1996
  • [2] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [3] A secure identity-based proxy multi-signature scheme
    Cao, Feng
    Cao, Zhenfu
    [J]. INFORMATION SCIENCES, 2009, 179 (03) : 292 - 302
  • [4] CERECEDO M, 1993, IEICE T FUND ELECTR, VE76A, P532
  • [5] Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
  • [6] Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
  • [7] Optimal-resilience proactive public-key cryptosystems
    Frankel, Y
    Gemmell, P
    MacKenzie, PD
    Yung, MT
    [J]. 38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1997, : 384 - 393
  • [8] Robust threshold DSS signatures
    Gennaro, R
    Jarecki, S
    Krawczyk, H
    Rabin, T
    [J]. INFORMATION AND COMPUTATION, 2001, 164 (01) : 54 - 84
  • [9] Secure distributed key generation for discrete-log based cryptosystems
    Gennaro, Rosario
    Jarecki, Stanislaw
    Krawczyk, Hugo
    Rabin, Tal
    [J]. JOURNAL OF CRYPTOLOGY, 2007, 20 (01) : 51 - 83
  • [10] GOYAL V, 2008, ICALP, V2, P579