Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Provably secure ciphertext policy ABE
Proceedings of the 14th ACM conference on Computer and communications security
Privacy-Aware Attribute-Based Encryption with User Accountability
ISC '09 Proceedings of the 12th International Conference on Information Security
Improving privacy and security in multi-authority attribute-based encryption
Proceedings of the 16th ACM conference on Computer and communications security
Hidden attribute-based signatures without anonymity revocation
Information Sciences: an International Journal
Multi-authority attribute based encryption
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Attribute-based encryption with partially hidden encryptor-specified access structures
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
New privacy-preserving architectures for identity-/attribute-based encryption
New privacy-preserving architectures for identity-/attribute-based encryption
Identity-Based encryption gone wild
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority
Journal of Systems and Software
Attribute-based encryption without key cloning
International Journal of Applied Cryptography
Attribute-based encryption without key cloning
International Journal of Applied Cryptography
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
Information Sciences: an International Journal
Hi-index | 0.00 |
Attribute-based encryption (ABE) is a promising tool for implementing fine-grained cryptographic access control. Very recently, motivated by reducing the trust assumption on the authority, and enhancing the privacy of users, a multiple-authority key-policy ABE system, together with a semi-generic anonymous key-issuing protocol, have been proposed by Chase and Chow in CCS 2009. Since ABE allows encryption for multiple users with attributes satisfying the same policy, it may not be always possible to associate a decryption key to a particular individual. A misbehaving user could abuse the anonymity by leaking the key to someone else, without worrying of being traced. In this paper, we propose a multi-authority ciphertext-policy (AND gates with wildcard) ABE scheme with accountability, which allows tracing the identity of a misbehaving user who leaked the decryption key to others, and thus reduces the trust assumptions not only on the authorities but also the users. The tracing process is efficient and its computational overhead is only proportional to the length of the identity.