• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Xu, Shengmin (Xu, Shengmin.) [1] | Yuan, Jiaming (Yuan, Jiaming.) [2] | Xu, Guowen (Xu, Guowen.) [3] | Li, Yingjiu (Li, Yingjiu.) [4] | Liu, Ximeng (Liu, Ximeng.) [5] (Scholars:刘西蒙) | Zhang, Yinghui (Zhang, Yinghui.) [6] | Ying, Zuobin (Ying, Zuobin.) [7]

Indexed by:

EI Scopus SCIE

Abstract:

Traitor tracing scheme is a paradigm to classify the users who illegal use of their decryption keys in cryptosystems. In the ciphertext-policy attribute-based cryptosystem, the decryption key usually contains the users' attributes, while the real identities are hidden. The decryption key with hidden identities enables malicious users to intentionally leak decryption keys or embed the decryption keys in the decryption device to gain illegal profits with a little risk of being discovered. To mitigate this problem, the concept of blackbox traceability in the ciphertext-policy attribute-based scheme was proposed to identify the malicious user via observing the I/O streams of the decryption device. However, current solutions with blackbox traceability are impractical since either the composite-order group or the linear complexity of system users is required. In this article, we proposed a secure ciphertext-policy attribute-based set encryption scheme with the short decryption key. The proposed scheme bases on the prime-order group to improve computational performances and aggregates multiple attributes into a constant-size attribute set to reduce the costs of communication overheads. By applying our proposed scheme with fingerprint codes, we then give an instantiation of the ciphertext-policy attribute-based scheme with blackbox traceability. Our scheme is provably secure under various q-type assumptions. (C) 2020 Elsevier Inc. All rights reserved.

Keyword:

Attribute-based encryption Blackbox traceability Short decryption key

Community:

  • [ 1 ] [Xu, Shengmin]Fujian Normal Univ, Coll Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350007, Peoples R China
  • [ 2 ] [Xu, Shengmin]Singapore Management Univ, Secure Mobile Ctr, Sch Informat Syst, Singapore 178902, Singapore
  • [ 3 ] [Yuan, Jiaming]Singapore Management Univ, Secure Mobile Ctr, Sch Informat Syst, Singapore 178902, Singapore
  • [ 4 ] [Li, Yingjiu]Singapore Management Univ, Secure Mobile Ctr, Sch Informat Syst, Singapore 178902, Singapore
  • [ 5 ] [Xu, Guowen]Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Sichuan, Peoples R China
  • [ 6 ] [Liu, Ximeng]Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350108, Peoples R China
  • [ 7 ] [Zhang, Yinghui]Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Peoples R China
  • [ 8 ] [Ying, Zuobin]Anhui Univ, Sch Comp Sci & Technol, Hefei 230601, Anhui, Peoples R China

Reprint 's Address:

  • 刘西蒙

    [Liu, Ximeng]Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350108, Peoples R China;;[Zhang, Yinghui]Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Peoples R China

Show more details

Related Keywords:

Related Article:

Source :

INFORMATION SCIENCES

ISSN: 0020-0255

Year: 2020

Volume: 538

Page: 19-38

6 . 7 9 5

JCR@2020

0 . 0 0 0

JCR@2023

ESI Discipline: COMPUTER SCIENCE;

ESI HC Threshold:149

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count: 19

SCOPUS Cited Count: 25

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 2

Online/Total:71/9696487
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1