Journal on Communications ›› 2016, Vol. 37 ›› Issue (1): 76-87.doi: 10.11959/j.issn.1000-436x.2016009

• Academic paper • Previous Articles     Next Articles

Adaptively secure attribute-based encryption for traitor tracing

ying MAHai1,sun ZENGGuo2,ping CHENJian1,hua WANGJin3,jun WANGZhan3   

  1. 1 College of Computer Science and Technology,Nantong University,Nantong 226019,China
    2 Department of Computer Science and Technology,Tongji University,Shanghai 201804,China
    3 School of Science,Nantong University,Nantong 226007,China
  • Online:2016-01-25 Published:2016-01-27
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Joint of NSFC and Microsoft Asia Research;The Program of Shanghai Subject Chief Scientist;The Ph.D Programs Foundation of Ministry of Education China;Shanghai Natural Science Foundation Program;The Natural Science Foundation of Nan tong University

Abstract:

For the key abuse problem in attribute-based encryption (ABE),each user was identified by his unique identity, and the collusion secure codes and the traitor tracing mechanism were introduced to the ABE scheme. The definition,security model and tracing model for adaptively secure attribute-based encryption for traitor tracing (ABTT)were forma-lized,and an adaptively secure ABTT scheme was proposed,which may trace traitors in policy-specific pirate decorders. Under these subgroup decision assumptions in composite groups and the DDH assumption,adaptively secure and can adaptively trace traitors were proved. Therefore, the scheme not only was capable of tracing adaptively traitors in policy-specific pirate decorders,but also further strengthens the security of ABE system,which has theoretical and prac-tical values.

Key words: attribute-based encryption, traitor tracing, dual system encryption, adaptive security, collusion secure code

No Suggested Reading articles found!