Making any attribute-based encryption accountable, efficiently

Junzuo Lai, Qiang Tang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Abstract

Attribute-based encryption (ABE) as one of the most interesting multi-recipient public encryption systems, naturally requires some “tracing mechanisms” to identify misbehaving users to foster accountability when unauthorized key re-distributions are taken place. We give a generic construction of (black-box) traceable ABE which only doubles the ciphertext size of the underlying ABE scheme. When instantiating properly, it yields the first such scheme with constant size ciphertext and expressive access control. Furthermore, we extend our generic construction of traceable ABE to support authority accountability. This property is essential for generating an un-deniable proof for user misbehaviors. Our new generic construction gives the first black-box traceable ABE with authority accountability, and constant size ciphertext. All properties are achieved in standard security models.

Original languageEnglish (US)
Title of host publicationComputer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Proceedings
EditorsJianying Zhou, Miguel Soriano, Javier Lopez
PublisherSpringer Verlag
Pages527-547
Number of pages21
ISBN (Print)9783319989884
DOIs
StatePublished - 2018
Event23rd European Symposium on Research in Computer Security, ESORICS 2018 - Barcelona, Spain
Duration: Sep 3 2018Sep 7 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11099 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other23rd European Symposium on Research in Computer Security, ESORICS 2018
Country/TerritorySpain
CityBarcelona
Period9/3/189/7/18

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Making any attribute-based encryption accountable, efficiently'. Together they form a unique fingerprint.

Cite this