中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme

文献类型:期刊论文

作者Wang, MQ ; Zhang, ZF ; Chen, C
刊名CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
出版日期2016
卷号28期号:4页码:1237-1245
关键词privacy-preserving decentralized attribute-based encryption security analysis
ISSN号1532-0626
中文摘要As it does not require a central authority or the cooperation among multiple authorities, decentralized attribute-based encryption is an efficient and flexible multi-authority attribute-based encryption system. In most existing multi-authority attribute-based encryption schemes, a global identifier (GID) is introduced to act as the linchpin to resist collusion attacks. Because GID as well as some sensitive attributes used to apply for secret keys will lead to the compromise of user's privacy, some schemes towards solving these privacy issues have been proposed. Nevertheless, only the privacy of GID was considered in prior works. Recently in ESORICS 2014, Han et al. put forward a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme in the standard model to address the additive privacy of attributes. In their work, a privacy-preserving key extract protocol is presented to protect both user's identifier and attributes. In this paper, we point out the security weakness of the scheme of Han et al. We present a collusion attack on their basic decentralized ciphertext-policy attribute-based encryption scheme and additionally show that the privacy protection of attributes in their privacy-preserving key extract protocol cannot be provided. Copyright (c) 2015 John Wiley & Sons, Ltd.
英文摘要As it does not require a central authority or the cooperation among multiple authorities, decentralized attribute-based encryption is an efficient and flexible multi-authority attribute-based encryption system. In most existing multi-authority attribute-based encryption schemes, a global identifier (GID) is introduced to act as the linchpin to resist collusion attacks. Because GID as well as some sensitive attributes used to apply for secret keys will lead to the compromise of user's privacy, some schemes towards solving these privacy issues have been proposed. Nevertheless, only the privacy of GID was considered in prior works. Recently in ESORICS 2014, Han et al. put forward a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme in the standard model to address the additive privacy of attributes. In their work, a privacy-preserving key extract protocol is presented to protect both user's identifier and attributes. In this paper, we point out the security weakness of the scheme of Han et al. We present a collusion attack on their basic decentralized ciphertext-policy attribute-based encryption scheme and additionally show that the privacy protection of attributes in their privacy-preserving key extract protocol cannot be provided. Copyright (c) 2015 John Wiley & Sons, Ltd.
收录类别SCI
语种英语
WOS记录号WOS:000370646300020
公开日期2016-12-09
源URL[http://ir.iscas.ac.cn/handle/311060/17341]  
专题软件研究所_软件所图书馆_期刊论文
推荐引用方式
GB/T 7714
Wang, MQ,Zhang, ZF,Chen, C. Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme[J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE,2016,28(4):1237-1245.
APA Wang, MQ,Zhang, ZF,&Chen, C.(2016).Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme.CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE,28(4),1237-1245.
MLA Wang, MQ,et al."Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme".CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 28.4(2016):1237-1245.

入库方式: OAI收割

来源:软件研究所

浏览0
下载0
收藏0
其他版本

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。