CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Digital signets: self-enforcing protection of digital information (preliminary version)
STOC '96 Proceedings of the twenty-eighth annual ACM symposium on Theory of computing
Fingerprinting Long Forgiving Messages
CRYPTO '85 Advances in Cryptology
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Efficient Trace and Revoke Schemes
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
New constructions of fuzzy identity-based encryption
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Attribute-based encryption with non-monotonic access structures
Proceedings of the 14th ACM conference on Computer and communications security
Provably secure ciphertext policy ABE
Proceedings of the 14th ACM conference on Computer and communications security
A content-driven access control system
Proceedings of the 7th symposium on Identity and trust on the Internet
Bounded Ciphertext Policy Attribute Based Encryption
ICALP '08 Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II
On the Security of Delegation in Access Control Systems
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Generalized Identity Based and Broadcast Encryption Schemes
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Attribute based proxy re-encryption with delegating capabilities
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Provably secure and efficient bounded ciphertext policy attribute based encryption
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Dual-Policy Attribute Based Encryption
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Privacy-Aware Attribute-Based Encryption with User Accountability
ISC '09 Proceedings of the 12th International Conference on Information Security
Conjunctive Broadcast and Attribute-Based Encryption
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Improving privacy and security in multi-authority attribute-based encryption
Proceedings of the 16th ACM conference on Computer and communications security
Multi-authority attribute based encryption
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Predicate encryption supporting disjunctions, polynomial equations, and inner products
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Multi-authority ciphertext-policy attribute-based encryption with accountability
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
New privacy-preserving architectures for identity-/attribute-based encryption
New privacy-preserving architectures for identity-/attribute-based encryption
Designated verifier signature schemes: attacks, new security notions and a new construction
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Token-controlled public key encryption
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Hi-index | 0.00 |
In this work, we consider the problem of key cloning in attribute-based encryption schemes. We introduce a new type of attribute-based encryption scheme, called token-based attribute-based encryption (tk-ABE) that provides strong deterrence for key cloning, in the sense that delegation of keys reveals some personal information about the user. It also has the feature that a misbehaving user can be easily revoked. We formalise the security requirements for such a scheme in terms of indistinguishability of the ciphertexts and two new security requirements which we call uncloneability and privacy-preserving. We construct a privacy-preserving uncloneable token-based attribute-based encryption scheme based on Cheung and Newport's ciphertext-policy attribute-based encryption scheme and prove the scheme satisfies the above three security requirements. We also introduce the notion of non-interactive uncloneable attribute-based encryption in order to remove the online token server in the tk-ABE. We then construct such a new scheme with provable security. It should be pointed out that, although our non-interactive scheme is token-free, the scheme does not have the capability to easily revoke users from the scheme. Hence, both types of schemes have their own merits of existence.