Journal on Communications ›› 2020, Vol. 41 ›› Issue (4): 150-161.doi: 10.11959/j.issn.1000-436x.2020016

• Papers • Previous Articles     Next Articles

Traceable attribute-based encryption scheme with key-delegation abuse resistance

Xixi YAN,Xu HE,Tao LIU,Qing YE,Jinxia YU,Yongli TANG   

  1. School of Computer Science and Technology,Henan Polytechnic University,Jiaozuo 454003,China
  • Revised:2019-12-18 Online:2020-04-25 Published:2020-04-30
  • Supported by:
    The National Natural Science Foundation of China(61802117);The “13th Five-Year” National Crypto Development Foundation(MMJJ20170122);Projects of Henan Provincial Department of Science and Technology(192102210280);The Innovative Scientists and Technicians Team of Henan Provincial High Education(20IRTSTHN013);The Innovative Research Team of Henan Polytechnic University(T2018-1)

Abstract:

Aiming at the problem that the traceability of a traceable attribute-based encryption (ABE) scheme was not sufficient to address the key abuse completely,a traceable ABE scheme against key-delegation abuse was proposed.A secret parameter was be shared to all user private key components corresponding to attributes,and the decryption was completed by using all these components together,such that only parts of them could not realize the decryption and the real key-delegation abuse resistance ability was be obtained consequently.A short signature technique was employed to prevent the tracing parameter embedded in a user private key from being forged,so as to achieve the traceability of the user who leaked his user private key.Supporting both key-delegation abuse resistance and user tracing enhances the security of the proposed scheme.And compared with related schemes,the proposed scheme has better advantage in terms of the parameters size and the computation cost.

Key words: attribute-based encryption, key-delegation abuse resistance, white-box, traceability

CLC Number: 

No Suggested Reading articles found!