• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Xu, S. (Xu, S..) [1] | Yuan, J. (Yuan, J..) [2] | Xu, G. (Xu, G..) [3] | Li, Y. (Li, Y..) [4] | Liu, X. (Liu, X..) [5] | Zhang, Y. (Zhang, Y..) [6] | Ying, Z. (Ying, Z..) [7]

Indexed by:

Scopus

Abstract:

Traitor tracing scheme is a paradigm to classify the users who illegal use of their decryption keys in cryptosystems. In the ciphertext-policy attribute-based cryptosystem, the decryption key usually contains the users’ attributes, while the real identities are hidden. The decryption key with hidden identities enables malicious users to intentionally leak decryption keys or embed the decryption keys in the decryption device to gain illegal profits with a little risk of being discovered. To mitigate this problem, the concept of blackbox traceability in the ciphertext-policy attribute-based scheme was proposed to identify the malicious user via observing the I/O streams of the decryption device. However, current solutions with blackbox traceability are impractical since either the composite-order group or the linear complexity of system users is required. In this article, we proposed a secure ciphertext-policy attribute-based set encryption scheme with the short decryption key. The proposed scheme bases on the prime-order group to improve computational performances and aggregates multiple attributes into a constant-size attribute set to reduce the costs of communication overheads. By applying our proposed scheme with fingerprint codes, we then give an instantiation of the ciphertext-policy attribute-based scheme with blackbox traceability. Our scheme is provably secure under various q-type assumptions. © 2020 Elsevier Inc.

Keyword:

Attribute-based encryption; Blackbox traceability; Short decryption key

Community:

  • [ 1 ] [Xu, S.]Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Informatics, Fujian Normal University, Fuzhou, 350007, China
  • [ 2 ] [Xu, S.]Secure Mobile Centre, School of Information Systems, Singapore Management University, Singapore, 178902, Singapore
  • [ 3 ] [Yuan, J.]Secure Mobile Centre, School of Information Systems, Singapore Management University, Singapore, 178902, Singapore
  • [ 4 ] [Xu, G.]School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, 611731, China
  • [ 5 ] [Li, Y.]Secure Mobile Centre, School of Information Systems, Singapore Management University, Singapore, 178902, Singapore
  • [ 6 ] [Liu, X.]College of Mathematics and Computer Science, Fuzhou University, Fuzhou, 350108, China
  • [ 7 ] [Zhang, Y.]National Engineering Laboratory for Wireless Security, Xi'an University of Posts and Telecommunications, Xi'an, 710121, China
  • [ 8 ] [Ying, Z.]School of Computer Science & Technology, Anhui University, Anhui, Hefei 230601, China

Reprint 's Address:

  • [Liu, X.]College of Mathematics and Computer Science, Fuzhou UniversityChina

Show more details

Related Keywords:

Related Article:

Source :

Information Sciences

ISSN: 0020-0255

Year: 2020

Volume: 538

Page: 19-38

6 . 7 9 5

JCR@2020

0 . 0 0 0

JCR@2023

ESI HC Threshold:149

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 25

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Affiliated Colleges:

Online/Total:268/9698024
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1