SpaCCS 2017: Security, Privacy, and Anonymity in Computation, Communication, and Storage pp 87-92 | Cite as
Traceable and Complete Fine-Grained Revocable Multi-authority Attribute-Based Encryption Scheme in Social Network
Abstract
Nowadays the data and user information involved in the social network with the nature of high complexity. More and more service providers and users will share the data in the cloud servers. To keep the shared data confidential against untrusted third-party service providers, settle single point failure and solve performance bottlenecks of authorized center as will as secret key abuse of malicious users who disclose their own private key, we propose a multi-authority attribute-based encryption scheme which supports traceability and fine-grained revocation mechanism in social network. The scheme is based on traditional attribute based encryption, which can realize distributed access control and support complete fine-grained revocation mechanism. The security is proved in the standard model, which effectively solves the above problems.
Keywords
Attribute-based encryption Revocable Traceable Fine-grained Social networkNotes
Acknowledgments
This work is supported by the National Natural Science Fundation of China under Grants No. 61632009 and the Science and Technology Project of Changsha under Grant No. kq1701089, and Fundamental Research Funds of Central South University under Grant No. 2017zzts713.
References
- 1.Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryptio. In: IEEE Symposium on Security and Privacy, pp. 321–334. IEEE Computer Society (2007)Google Scholar
- 2.Rahulamathavan, Y., Veluru, S., Han, J., et al.: User collusion avoidance scheme for privacy-preserving decentralized key-policy attribute-based encryption. IEEE Trans. Comput. 65(9), 2939–2946 (2016)MathSciNetCrossRefMATHGoogle Scholar
- 3.Attrapadung, N., Libert, B., de Panafieu, E.: Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 90–108. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19379-8_6 CrossRefGoogle Scholar
- 4.Wang, H.P., Zhao, J.J.: Ciphertext-policy attribute-based encryption with anonymous access structure. Comput. Sci. 2016Google Scholar
- 5.Ning, J., Dong, X., Cao, Z., et al.: White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans. Inf. Forensics Secur. 10(6), 1274–1288 (2015)CrossRefGoogle Scholar
- 6.Peng, K., Zhang, X.: Adaptively security CP-ABE scheme supporting attribute revocation. Comput. Eng. 41(4), 151–155 (2015)MathSciNetGoogle Scholar
- 7.Li, Q., Xiong, J., Xiong, J., et al.: Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption. Secur. Commun. Netw. 8(18), 4098–4109 (2015)CrossRefGoogle Scholar
- 8.Phan, D.H., Trinh, V.C.: Identity-based trace and revoke schemes. In: Boyen, X., Chen, X. (eds.) ProvSec 2011. LNCS, vol. 6980, pp. 204–221. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24316-5_15 CrossRefGoogle Scholar