Skip to main content

A Review on Traceable Attribute-Based Encryption

  • Conference paper
  • First Online:
  • 1169 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1563))

Abstract

Attribute-Based Encryption (ABE) is a kind of realization of fine-grained access to encrypted data of public key encryption method, but due to a variety of users can share the decryption key, the attribute of traditional encryption mechanism cannot track leaking key malicious users, so in recent years, people study new traceable attribute based encryption schemes, supporting tracing key holders. This article analyzes the strengths and weaknesses of traceable attribute base encryption schemes from various aspects and looks into the future research.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bouchaala, M., Ghazel, C., Saidane, L.A.: Trak-cpabe: a novel traceable, revocable and accountable ciphertext-policy attribute-based encryption scheme in cloud computing. J. Inf. Secur. Appl. 61, 102914 (2021)

    Google Scholar 

  2. Fu, X., Nie, X., Li, F.: Black box traceable ciphertext policy attribute-based encryption scheme. Information 6(3), 481–493 (2015)

    Article  Google Scholar 

  3. Guo, L., Yang, X., Yau, W.C.: TABE-DAC: Efficient traceable attribute-based encryption scheme with dynamic access control based on blockchain. IEEE Access 9, 8479–8490 (2021)

    Article  Google Scholar 

  4. Han, D., Pan, N., Li, K.C.: A traceable and revocable ciphertext-policy attribute based encryption scheme based on privacy protection. IEEE Trans. Dependable Secure Comput. 19(1), 316–327 (2022). https://doi.org/10.1109/TDSC.2020.2977646

  5. Jiaxin, G., Jiameng, S., Jing, Q.: Traceable outsourcing attribute-based encryption with attribute revocation. J. Comput. Res. Dev. 56(10), 2160 (2019)

    Google Scholar 

  6. Kumar, G.S.: Efficient data access control for cloud computing with large universe and traceable attribute-based encryption. Int. J. Fuzzy Syst. Appl. (IJFSA) 9(4), 61–81 (2020)

    Google Scholar 

  7. Li, Y., Qi, F., Tang, Z.: Traceable and complete fine-grained revocable multi-authority attribute-based encryption scheme in social network. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 87–92. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72389-1_8

    Chapter  Google Scholar 

  8. Lian, H., Wang, G., Wang, Q.: Fully secure traceable and revocable-storage attribute-based encryption with short update keys via subset difference method. In: 2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC), pp. 1–8. IEEE (2018)

    Google Scholar 

  9. Ling, J., Chen, J., Chen, J., Gan, W.: Multiauthority attribute-based encryption with traceable and dynamic policy updating. Secur. Commun. Netw. 2021 (2021)

    Google Scholar 

  10. Liu, S., Yu, J., Hu, C., Li, M.: Traceable multiauthority attribute-based encryption with outsourced decryption and hidden policy for CIoT. Wirel. Commun. Mob. Comput. 2021 (2021)

    Google Scholar 

  11. Liu, Z., Wang, X., Cui, L., Jiang, Z.L., Zhang, C.: White-box traceable dynamic attribute based encryption. In: 2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC), pp. 526–530. IEEE (2017)

    Google Scholar 

  12. Liu, Z., Cao, Z., Wong, D.S.: White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures. IEEE Trans. Inf. Forensics Secur. 8(1), 76–88 (2012)

    Google Scholar 

  13. Liu, Z., Cao, Z., Wong, D.S.: Fully collusion-resistant traceable key-policy attribute-based encryption with sub-linear size ciphertexts. In: Lin, D., Yung, M., Zhou, J. (eds.) Inscrypt 2014. LNCS, vol. 8957, pp. 403–423. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-16745-9_22

    Chapter  Google Scholar 

  14. Liu, Z., Duan, S., Zhou, P., Wang, B.: Traceable-then-revocable ciphertext-policy attribute-based encryption scheme. Futur. Gener. Comput. Syst. 93, 903–913 (2019)

    Article  Google Scholar 

  15. Ning, J., Dong, X., Cao, Z., Wei, L., Lin, X.: White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans. Inf. Forensics Secur. 10(6), 1274–1288 (2015)

    Article  Google Scholar 

  16. Qi, F., Li, Y., Tang, Z.: Revocable and traceable key-policy attribute-based encryption scheme. J. Commun. 39(11), 63–69 (2018)

    Google Scholar 

  17. Qiao, H., Ren, J., Wang, Z., Ba, H., Zhou, H.: Compulsory traceable ciphertextpolicy attribute-based encryption against privilege abuse in fog computing. Futur. Gener. Comput. Syst. 88, 107–116 (2018)

    Article  Google Scholar 

  18. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27

    Chapter  Google Scholar 

  19. Wang, S., Guo, K., Zhang, Y.: Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage. PLoS ONE 13(9), e0203225 (2018)

    Google Scholar 

  20. Wang, X., Chi, Y., Zhang, Y.: Traceable ciphertext policy attribute-based encryption scheme with user revocation for cloud storage. In: 2020 International Conference on Computer Engineering and Application (ICCEA), pp. 91–95. IEEE (2020)

    Google Scholar 

  21. Wu, A., Zhang, Y., Zheng, X., Guo, R., Zhao, Q., Zheng, D.: Efficient and privacypreserving traceable attribute-based encryption in blockchain. Ann. Telecommun. 74(7), 401–411 (2019)

    Article  Google Scholar 

  22. Xixi, Y., Xu, H., Tao, L., Qing, Y., Jinxia, Y., Yongli, T.: Traceable attribute-based encryption scheme with key-delegation abuse resistance. J. Commun. 41(4), 150 (2020)

    Google Scholar 

  23. Yan, X., He, X., Yu, J., Tang, Y.: White-box traceable ciphertext-policy attributebased encryption in multi-domain environment. IEEE Access 7, 128298–128312 (2019)

    Article  Google Scholar 

  24. Yan, X., Yuan, X., Zhang, Q., Tang, Y.: Traceable and weighted attribute-based encryption scheme in the cloud environment. IEEE Access 8, 38285–38295 (2020)

    Article  Google Scholar 

  25. Yang, X., Yang, P., An, F., Zhou, Q., Yang, M.: Traceable multi-authority attribute-based encryption scheme for cloud computing. In: 2017 14th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), pp. 263–267. IEEE (2017)

    Google Scholar 

  26. Yang, Y., et al.: Dual traceable distributed attribute-based searchable encryption and ownership transfer. IEEE Trans. Cloud Comput. (2021)

    Google Scholar 

  27. Yu, G., Wang, Y., Cao, Z., Lin, J., Wang, X.: Traceable and undeniable ciphertextpolicy attribute-based encryption for cloud storage service. Int. J. Distrib. Sens. Netw. 15(4), 1550147719841276 (2019)

    Google Scholar 

  28. Zhang, K., Li, Y., Song, Y., Lu, L., Zhang, T., Jiang, Q.: A traceable and revocable multiauthority attribute-based encryption scheme with fast access. Secur. Commun. Netw. 2020 (2020)

    Google Scholar 

  29. Zhou, J., Cao, Z., Dong, X., Lin, X.: TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 2398–2406. IEEE (2015)

    Google Scholar 

Download references

Acknowledgement

This research was funded by the Philosophy and Social Science Foundation of the Jiangsu Higher Education Institutes of China “Research on Blockchain-based Intelligent Credit Information System and its Privacy Preservation Mechanism” (Grants No. 2021SJA0448), the Natural Science Foundation of Jiangsu Province (Grants No. BK20210928), the Higher Education Research Project of Nanjing Institute of Technology (Grants No. 2021ZC13), Beijing Tianrongxin Education Technology Co., Ltd, and Beijing Key Laboratory of Security and Privacy in Intelligent Transportation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenxiu Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shi, Y., Ni, W., Xu, W., Yang, W., Li, Q., Xue, Z. (2022). A Review on Traceable Attribute-Based Encryption. In: Tian, Y., Ma, T., Khan, M.K., Sheng, V.S., Pan, Z. (eds) Big Data and Security. ICBDS 2021. Communications in Computer and Information Science, vol 1563. Springer, Singapore. https://doi.org/10.1007/978-981-19-0852-1_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-0852-1_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-0851-4

  • Online ISBN: 978-981-19-0852-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics