Abstract
Attribute-Based Encryption (ABE) is a kind of realization of fine-grained access to encrypted data of public key encryption method, but due to a variety of users can share the decryption key, the attribute of traditional encryption mechanism cannot track leaking key malicious users, so in recent years, people study new traceable attribute based encryption schemes, supporting tracing key holders. This article analyzes the strengths and weaknesses of traceable attribute base encryption schemes from various aspects and looks into the future research.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Bouchaala, M., Ghazel, C., Saidane, L.A.: Trak-cpabe: a novel traceable, revocable and accountable ciphertext-policy attribute-based encryption scheme in cloud computing. J. Inf. Secur. Appl. 61, 102914 (2021)
Fu, X., Nie, X., Li, F.: Black box traceable ciphertext policy attribute-based encryption scheme. Information 6(3), 481–493 (2015)
Guo, L., Yang, X., Yau, W.C.: TABE-DAC: Efficient traceable attribute-based encryption scheme with dynamic access control based on blockchain. IEEE Access 9, 8479–8490 (2021)
Han, D., Pan, N., Li, K.C.: A traceable and revocable ciphertext-policy attribute based encryption scheme based on privacy protection. IEEE Trans. Dependable Secure Comput. 19(1), 316–327 (2022). https://doi.org/10.1109/TDSC.2020.2977646
Jiaxin, G., Jiameng, S., Jing, Q.: Traceable outsourcing attribute-based encryption with attribute revocation. J. Comput. Res. Dev. 56(10), 2160 (2019)
Kumar, G.S.: Efficient data access control for cloud computing with large universe and traceable attribute-based encryption. Int. J. Fuzzy Syst. Appl. (IJFSA) 9(4), 61–81 (2020)
Li, Y., Qi, F., Tang, Z.: Traceable and complete fine-grained revocable multi-authority attribute-based encryption scheme in social network. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 87–92. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72389-1_8
Lian, H., Wang, G., Wang, Q.: Fully secure traceable and revocable-storage attribute-based encryption with short update keys via subset difference method. In: 2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC), pp. 1–8. IEEE (2018)
Ling, J., Chen, J., Chen, J., Gan, W.: Multiauthority attribute-based encryption with traceable and dynamic policy updating. Secur. Commun. Netw. 2021 (2021)
Liu, S., Yu, J., Hu, C., Li, M.: Traceable multiauthority attribute-based encryption with outsourced decryption and hidden policy for CIoT. Wirel. Commun. Mob. Comput. 2021 (2021)
Liu, Z., Wang, X., Cui, L., Jiang, Z.L., Zhang, C.: White-box traceable dynamic attribute based encryption. In: 2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC), pp. 526–530. IEEE (2017)
Liu, Z., Cao, Z., Wong, D.S.: White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures. IEEE Trans. Inf. Forensics Secur. 8(1), 76–88 (2012)
Liu, Z., Cao, Z., Wong, D.S.: Fully collusion-resistant traceable key-policy attribute-based encryption with sub-linear size ciphertexts. In: Lin, D., Yung, M., Zhou, J. (eds.) Inscrypt 2014. LNCS, vol. 8957, pp. 403–423. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-16745-9_22
Liu, Z., Duan, S., Zhou, P., Wang, B.: Traceable-then-revocable ciphertext-policy attribute-based encryption scheme. Futur. Gener. Comput. Syst. 93, 903–913 (2019)
Ning, J., Dong, X., Cao, Z., Wei, L., Lin, X.: White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans. Inf. Forensics Secur. 10(6), 1274–1288 (2015)
Qi, F., Li, Y., Tang, Z.: Revocable and traceable key-policy attribute-based encryption scheme. J. Commun. 39(11), 63–69 (2018)
Qiao, H., Ren, J., Wang, Z., Ba, H., Zhou, H.: Compulsory traceable ciphertextpolicy attribute-based encryption against privilege abuse in fog computing. Futur. Gener. Comput. Syst. 88, 107–116 (2018)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27
Wang, S., Guo, K., Zhang, Y.: Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage. PLoS ONE 13(9), e0203225 (2018)
Wang, X., Chi, Y., Zhang, Y.: Traceable ciphertext policy attribute-based encryption scheme with user revocation for cloud storage. In: 2020 International Conference on Computer Engineering and Application (ICCEA), pp. 91–95. IEEE (2020)
Wu, A., Zhang, Y., Zheng, X., Guo, R., Zhao, Q., Zheng, D.: Efficient and privacypreserving traceable attribute-based encryption in blockchain. Ann. Telecommun. 74(7), 401–411 (2019)
Xixi, Y., Xu, H., Tao, L., Qing, Y., Jinxia, Y., Yongli, T.: Traceable attribute-based encryption scheme with key-delegation abuse resistance. J. Commun. 41(4), 150 (2020)
Yan, X., He, X., Yu, J., Tang, Y.: White-box traceable ciphertext-policy attributebased encryption in multi-domain environment. IEEE Access 7, 128298–128312 (2019)
Yan, X., Yuan, X., Zhang, Q., Tang, Y.: Traceable and weighted attribute-based encryption scheme in the cloud environment. IEEE Access 8, 38285–38295 (2020)
Yang, X., Yang, P., An, F., Zhou, Q., Yang, M.: Traceable multi-authority attribute-based encryption scheme for cloud computing. In: 2017 14th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), pp. 263–267. IEEE (2017)
Yang, Y., et al.: Dual traceable distributed attribute-based searchable encryption and ownership transfer. IEEE Trans. Cloud Comput. (2021)
Yu, G., Wang, Y., Cao, Z., Lin, J., Wang, X.: Traceable and undeniable ciphertextpolicy attribute-based encryption for cloud storage service. Int. J. Distrib. Sens. Netw. 15(4), 1550147719841276 (2019)
Zhang, K., Li, Y., Song, Y., Lu, L., Zhang, T., Jiang, Q.: A traceable and revocable multiauthority attribute-based encryption scheme with fast access. Secur. Commun. Netw. 2020 (2020)
Zhou, J., Cao, Z., Dong, X., Lin, X.: TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 2398–2406. IEEE (2015)
Acknowledgement
This research was funded by the Philosophy and Social Science Foundation of the Jiangsu Higher Education Institutes of China “Research on Blockchain-based Intelligent Credit Information System and its Privacy Preservation Mechanism” (Grants No. 2021SJA0448), the Natural Science Foundation of Jiangsu Province (Grants No. BK20210928), the Higher Education Research Project of Nanjing Institute of Technology (Grants No. 2021ZC13), Beijing Tianrongxin Education Technology Co., Ltd, and Beijing Key Laboratory of Security and Privacy in Intelligent Transportation.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Shi, Y., Ni, W., Xu, W., Yang, W., Li, Q., Xue, Z. (2022). A Review on Traceable Attribute-Based Encryption. In: Tian, Y., Ma, T., Khan, M.K., Sheng, V.S., Pan, Z. (eds) Big Data and Security. ICBDS 2021. Communications in Computer and Information Science, vol 1563. Springer, Singapore. https://doi.org/10.1007/978-981-19-0852-1_11
Download citation
DOI: https://doi.org/10.1007/978-981-19-0852-1_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-0851-4
Online ISBN: 978-981-19-0852-1
eBook Packages: Computer ScienceComputer Science (R0)