2016
DOI: 10.1007/978-3-319-40253-6_29
|View full text |Cite
|
Sign up to set email alerts
|

Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance

Abstract: Attribute-based encryption (ABE) is a promising cryptographic primitive that allows one-to-many encryption. In such a system, users' private keys are linked to their access rights. We note that if a user can generate a new private key for a portion of his/her access right, this could potentially lead to some undesirable situations, which violate the access control policy. Interestingly, to date, there is no work that looks into this matter in detail nor addresses it. We point out that this is a "property" that… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Our revocation techniques can be applied to any ABE scheme that does not support revocation (e.g., References 1,3,13). However, in this paper, we choose the scheme proposed in Reference 1 for several reasons.…”
Section: Introductionmentioning
confidence: 99%
“…Our revocation techniques can be applied to any ABE scheme that does not support revocation (e.g., References 1,3,13). However, in this paper, we choose the scheme proposed in Reference 1 for several reasons.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, if the user ID value is managed by the AA, the anonymity of the cloud user will not be ensured. Another problem is that because data is encrypted with attribute-based encryption, the size of the ciphertext increases with the number of attributes contained in the access structure [ 12 , 13 , 14 ]. This can waste space in cloud storage, and when the user decrypts the ciphertext the amount of computation increases with the number of attributes, which affects the user’s ciphertext decryption speed.…”
Section: Introductionmentioning
confidence: 99%
“…A traceable CP‐ABE is provided by Liu et al in [10] to provide the traceability feature in the existing CP‐ABE while maintaining its security. Moreover, a CP‐ABE scheme is presented in [11] for addressing the key‐delegation abuse problem in the existing CP‐ABE system by introducing new properties related to security. Additionally, the authors integrated the traceability feature with the scheme.…”
Section: Introductionmentioning
confidence: 99%