Efficient and Large Universe Ciphertext-Policy Attribute-Based Encryption with Black-Box Traceability for eHealth
- 42 Downloads
In the modern medical environment, massive application of electronic health systems has brought us great convenience. At the same time, the large and cumbersome data storage has become easier with the emergence of cloud computing. However, the emergence of shared platforms has also brought many security issues such as data loss and privacy exposures, especially the exposures of sensitive data by illegal users. In this paper we propose an efficient and large universe ciphertext-policy attribute-based encryption (CP-ABE) scheme with black-box traceability for the collaborative eHealth system. It is of a higher efficiency by reducing greatly the cost of encryption and decryption operations. We prove the security of our new scheme under the q-parallel BDHE assumption in the standard model.
KeywordsCP-ABE Compulsory traceability Large universe Black-box Standard model
The work is supported in part by the Key Lab of Information Network Security of Ministry of Public Security (The Third Research Institute of Ministry of Public Security) under Grant No. C18603, the NSFC-Zhejiang Joint Fund for the Integration of Industrialization and Informatization under Grant No. U1509219, the National Key R&D Program of China under Grant No. 2017YFB0802302, the Shanghai Natural Science Foundation under Grant No. 17ZR1408400, the National Natural Science Foundation of China under Grant Nos. 61601129, 11701179, the Shanghai Science and Technology Commission Program under Grant No. 18511105700, and the Shanghai Sailing Program under Grant No. 17YF1404300.
- 1.Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457–473. Springer, Heidelberg (2005). Journal 2(5), 99–110 (2016)Google Scholar
- 2.Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 456–465. ACM (2007)Google Scholar
- 4.Liu, Z., Cao, Z., Wong, D.S.: Black box traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer Communications Security, pp. 475–486. ACM (2013)Google Scholar