Adaptively secure attribute-based encryption for traitor tracing

For the key abuse problem in attribute-based encryption (ABE),each user was identified by his unique identity, and the collusion secure codes and the traitor tracing mechanism were introduced to the ABE scheme. The definition,security model and tracing model for adaptively secure attribute-based enc...

Full description

Saved in:
Bibliographic Details
Main Authors: ying MAHai, sun ZENGGuo, ping CHENJian, hua WANGJin, jun WANGZhan
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2016-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016009/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539619809656832
author ying MAHai
sun ZENGGuo
ping CHENJian
hua WANGJin
jun WANGZhan
author_facet ying MAHai
sun ZENGGuo
ping CHENJian
hua WANGJin
jun WANGZhan
author_sort ying MAHai
collection DOAJ
description For the key abuse problem in attribute-based encryption (ABE),each user was identified by his unique identity, and the collusion secure codes and the traitor tracing mechanism were introduced to the ABE scheme. The definition,security model and tracing model for adaptively secure attribute-based encryption for traitor tracing (ABTT)were forma-lized,and an adaptively secure ABTT scheme was proposed,which may trace traitors in policy-specific pirate decorders. Under these subgroup decision assumptions in composite groups and the DDH assumption,adaptively secure and can adaptively trace traitors were proved. Therefore, the scheme not only was capable of tracing adaptively traitors in policy-specific pirate decorders,but also further strengthens the security of ABE system,which has theoretical and prac-tical values.
format Article
id doaj-art-e784bae903774d11bf2d40f38ba4a1e4
institution Kabale University
issn 1000-436X
language zho
publishDate 2016-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-e784bae903774d11bf2d40f38ba4a1e42025-01-14T06:54:36ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2016-01-0137768759698470Adaptively secure attribute-based encryption for traitor tracingying MAHaisun ZENGGuoping CHENJianhua WANGJinjun WANGZhanFor the key abuse problem in attribute-based encryption (ABE),each user was identified by his unique identity, and the collusion secure codes and the traitor tracing mechanism were introduced to the ABE scheme. The definition,security model and tracing model for adaptively secure attribute-based encryption for traitor tracing (ABTT)were forma-lized,and an adaptively secure ABTT scheme was proposed,which may trace traitors in policy-specific pirate decorders. Under these subgroup decision assumptions in composite groups and the DDH assumption,adaptively secure and can adaptively trace traitors were proved. Therefore, the scheme not only was capable of tracing adaptively traitors in policy-specific pirate decorders,but also further strengthens the security of ABE system,which has theoretical and prac-tical values.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016009/attribute-based encryptiontraitor tracingdual system encryptionadaptive securitycollusion secure code
spellingShingle ying MAHai
sun ZENGGuo
ping CHENJian
hua WANGJin
jun WANGZhan
Adaptively secure attribute-based encryption for traitor tracing
Tongxin xuebao
attribute-based encryption
traitor tracing
dual system encryption
adaptive security
collusion secure code
title Adaptively secure attribute-based encryption for traitor tracing
title_full Adaptively secure attribute-based encryption for traitor tracing
title_fullStr Adaptively secure attribute-based encryption for traitor tracing
title_full_unstemmed Adaptively secure attribute-based encryption for traitor tracing
title_short Adaptively secure attribute-based encryption for traitor tracing
title_sort adaptively secure attribute based encryption for traitor tracing
topic attribute-based encryption
traitor tracing
dual system encryption
adaptive security
collusion secure code
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016009/
work_keys_str_mv AT yingmahai adaptivelysecureattributebasedencryptionfortraitortracing
AT sunzengguo adaptivelysecureattributebasedencryptionfortraitortracing
AT pingchenjian adaptivelysecureattributebasedencryptionfortraitortracing
AT huawangjin adaptivelysecureattributebasedencryptionfortraitortracing
AT junwangzhan adaptivelysecureattributebasedencryptionfortraitortracing