Efficient and Large Universe Ciphertext-Policy Attribute-Based Encryption with Black-Box Traceability for eHealth

  • Jing Zhao
  • Peng ZengEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1147)


In the modern medical environment, massive application of electronic health systems has brought us great convenience. At the same time, the large and cumbersome data storage has become easier with the emergence of cloud computing. However, the emergence of shared platforms has also brought many security issues such as data loss and privacy exposures, especially the exposures of sensitive data by illegal users. In this paper we propose an efficient and large universe ciphertext-policy attribute-based encryption (CP-ABE) scheme with black-box traceability for the collaborative eHealth system. It is of a higher efficiency by reducing greatly the cost of encryption and decryption operations. We prove the security of our new scheme under the q-parallel BDHE assumption in the standard model.


CP-ABE Compulsory traceability Large universe Black-box Standard model 



The work is supported in part by the Key Lab of Information Network Security of Ministry of Public Security (The Third Research Institute of Ministry of Public Security) under Grant No. C18603, the NSFC-Zhejiang Joint Fund for the Integration of Industrialization and Informatization under Grant No. U1509219, the National Key R&D Program of China under Grant No. 2017YFB0802302, the Shanghai Natural Science Foundation under Grant No. 17ZR1408400, the National Natural Science Foundation of China under Grant Nos. 61601129, 11701179, the Shanghai Science and Technology Commission Program under Grant No. 18511105700, and the Shanghai Sailing Program under Grant No. 17YF1404300.


  1. 1.
    Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457–473. Springer, Heidelberg (2005). Journal 2(5), 99–110 (2016)Google Scholar
  2. 2.
    Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 456–465. ACM (2007)Google Scholar
  3. 3.
    Guo, F., Mu, Y., Susilo, W., et al.: CP-ABE with constant-size keys for lightweight devices. IEEE Trans. Inf. Forensics Secur. 9(5), 763–771 (2014)CrossRefGoogle Scholar
  4. 4.
    Liu, Z., Cao, Z., Wong, D.S.: Black box traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer Communications Security, pp. 475–486. ACM (2013)Google Scholar
  5. 5.
    Qiao, H., Ren, J., Wang, Z., et al.: Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing. Future Gener. Comput. Syst. 88, 107–116 (2018)CrossRefGoogle Scholar
  6. 6.
    Qiao, H., Ba, H., Zhou, H., et al.: Practical, provably secure, and black-box traceable CP-ABE for cryptographic cloud storage. Symmetry 10(10), 482 (2018)CrossRefGoogle Scholar
  7. 7.
    Liu, Z., Wong, D.S.: Practical attribute-based encryption: traitor tracing, revocation and large universe. Comput. J. 59(7), 983–1004 (2016)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Shanghai Key Laboratory of Trustworthy ComputingEast China Normal UniversityShanghaiChina
  2. 2.Key Lab of Information Network Security of Ministry of Public SecurityThe Third Research Institute of Ministry of Public SecurityShanghaiChina

Personalised recommendations