Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe

In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), a user’s decryption key is associated with attributes which in general are not related to the user’s identity, and the same set of attributes could be shared between multiple users. From the decryption key, if the user created a decryption blackbox for sale, this malicious user could be difficult to identify from the blackbox. Hence in p...

متن کامل

Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups

A Ciphertext-Policy Attribute-Based Encryption (CP-ABE) allows users to specify the access policies without having to know the identities of users. In this paper, we contribute by proposing an ABE scheme which enables revoking corrupted users. Given a key-like blackbox, our system can identify at least one of the users whose key must have been used to construct the blackbox and can revoke the k...

متن کامل

Attribute-Based Traitor Tracing

In this paper, we focus on traitor tracing scheme in attribute-based encryption (ABE) scenarios. A well-known concern in the setting of attribute-based encryption is that a user (or set of colluding users) can create a new key (or decryption device) by using his legal one and distribute it for malicious use. To mitigate this problem, we introduce the notion of attribute-based traitor tracing (A...

متن کامل

Generic Codes Based Traitor Tracing Scheme with Revocation Ability from Attributes Based Encryption

Traitor tracing is needed because some users in broadcast encryption system may give out their decryption keys to construct pirate decoders. Many codes based traitor tracing scheme were proposed. However, as stated by Billet and Phan in ICITS 2008, they lack of revocation ability. We provide a generic scheme of codes based traitor tracing with revocation ability, based on ciphertextpolicy attri...

متن کامل

Large Universe Attribute-Based Encryption Scheme from Lattices

School of science, Xi’an University of Technology Xi'an, 710054, Shaanxi , CHINA [email protected] (Lab of Cryptography and Network Security, Xi’an University of Technology, Xi’an, 710054, China) Abstract. We propose a large universe attribute-based encryption (ABE ) scheme from lattices. It is inspired by Brent Waters’s scheme which is a large universe attribute-based encryption using bilinear ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Computer Journal

سال: 2015

ISSN: 0010-4620,1460-2067

DOI: 10.1093/comjnl/bxv101