Traceable and Complete Fine-Grained Revocable Multi-authority Attribute-Based Encryption Scheme in Social Network

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10656)

Abstract

Nowadays the data and user information involved in the social network with the nature of high complexity. More and more service providers and users will share the data in the cloud servers. To keep the shared data confidential against untrusted third-party service providers, settle single point failure and solve performance bottlenecks of authorized center as will as secret key abuse of malicious users who disclose their own private key, we propose a multi-authority attribute-based encryption scheme which supports traceability and fine-grained revocation mechanism in social network. The scheme is based on traditional attribute based encryption, which can realize distributed access control and support complete fine-grained revocation mechanism. The security is proved in the standard model, which effectively solves the above problems.

Keywords

Attribute-based encryption Revocable Traceable Fine-grained Social network 

Notes

Acknowledgments

This work is supported by the National Natural Science Fundation of China under Grants No. 61632009 and the Science and Technology Project of Changsha under Grant No. kq1701089, and Fundamental Research Funds of Central South University under Grant No. 2017zzts713.

References

  1. 1.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryptio. In: IEEE Symposium on Security and Privacy, pp. 321–334. IEEE Computer Society (2007)Google Scholar
  2. 2.
    Rahulamathavan, Y., Veluru, S., Han, J., et al.: User collusion avoidance scheme for privacy-preserving decentralized key-policy attribute-based encryption. IEEE Trans. Comput. 65(9), 2939–2946 (2016)MathSciNetCrossRefMATHGoogle Scholar
  3. 3.
    Attrapadung, N., Libert, B., de Panafieu, E.: Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 90–108. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-3-642-19379-8_6 CrossRefGoogle Scholar
  4. 4.
    Wang, H.P., Zhao, J.J.: Ciphertext-policy attribute-based encryption with anonymous access structure. Comput. Sci. 2016Google Scholar
  5. 5.
    Ning, J., Dong, X., Cao, Z., et al.: White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans. Inf. Forensics Secur. 10(6), 1274–1288 (2015)CrossRefGoogle Scholar
  6. 6.
    Peng, K., Zhang, X.: Adaptively security CP-ABE scheme supporting attribute revocation. Comput. Eng. 41(4), 151–155 (2015)MathSciNetGoogle Scholar
  7. 7.
    Li, Q., Xiong, J., Xiong, J., et al.: Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption. Secur. Commun. Netw. 8(18), 4098–4109 (2015)CrossRefGoogle Scholar
  8. 8.
    Phan, D.H., Trinh, V.C.: Identity-based trace and revoke schemes. In: Boyen, X., Chen, X. (eds.) ProvSec 2011. LNCS, vol. 6980, pp. 204–221. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-3-642-24316-5_15 CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.School of Information Science and EngineeringCentral South UniversityChangshaChina

Personalised recommendations