• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Kai, Ma Jianfeng, Zhang Junwei, Ying Zuobin, Zhang Tao, Liu Ximeng. Online/Offline Traceable Attribute-Based Encryption[J]. Journal of Computer Research and Development, 2018, 55(1): 216-224. DOI: 10.7544/issn1000-1239.2018.20160799
Citation: Zhang Kai, Ma Jianfeng, Zhang Junwei, Ying Zuobin, Zhang Tao, Liu Ximeng. Online/Offline Traceable Attribute-Based Encryption[J]. Journal of Computer Research and Development, 2018, 55(1): 216-224. DOI: 10.7544/issn1000-1239.2018.20160799

Online/Offline Traceable Attribute-Based Encryption

More Information
  • Published Date: December 31, 2017
  • Attribute-based encryption (ABE), as a public key encryption, can be utilized for fine-grained access control. However, there are two main drawbacks that limit the applications of attribute-based encryption. First, as different users may have the same decryption privileges in ciphertext-policy attribute-based encryption,it is difficult to catch the users who sell their secret keys for financial benefit. Second, the number of resource-consuming exponentiation operations required to encrypt a message in ciphertext-policy attribute-based encryption grows with the complexity of the access policy, which presents a significant challenge for the users who encrypt data on mobile devices. Towards this end, after proposing the security model for online/offline traceable attribute-based encryption, we present an online/offline traceable ciphertext-policy attribute-based encryption scheme in prime order bilinear groups, and further prove that it is selectively secure in the standard model. If a malicious user leaks his/her secret key to others for benefit, he/she will be caught by a tracing algorithm in our proposed scheme. Extensive efficiency analysis results indicate that the proposed scheme moves the majority cost of an encryption into the offline encryption phase and is suitable for user encryption on mobile devices. In addition, the proposed scheme supports large universe of attributes, which makes it more flexible for practical applications.
  • Related Articles

    [1]Li Jiguo, Zhu Liufu, Liu Chengdong, Lu Yang, Han Jinguang, Wang Huaqun, Zhang Yichen. Provably Secure Traceable Attribute-Based Sanitizable Signature Scheme in the Standard Model[J]. Journal of Computer Research and Development, 2021, 58(10): 2253-2264. DOI: 10.7544/issn1000-1239.2021.20210669
    [2]Deng Xiangtian, Qian Haifeng. Flexible Fine-Grained Authorization Public Key Encryption with Equality Test Under Standard Model[J]. Journal of Computer Research and Development, 2021, 58(10): 2222-2237. DOI: 10.7544/issn1000-1239.2021.20210596
    [3]Wu Liqiang, Yang Xiaoyuan, Zhang Minqing. Identity-Based Threshold Decryption Scheme from Lattices under the Standard Model[J]. Journal of Computer Research and Development, 2018, 55(10): 2164-2173. DOI: 10.7544/issn1000-1239.2018.20180446
    [4]Chen Ming, Yuan Shaoliang. Provably Secure Identity-Based Multi-Proxy Signature Scheme in Standard Model[J]. Journal of Computer Research and Development, 2016, 53(8): 1879-1892. DOI: 10.7544/issn1000-1239.2016.20150197
    [5]Zhang Minqing, Du Weidong, Yang Xiaoyuan, HanYiliang. A Fully Secure KP-ABE Scheme in the Standard Model[J]. Journal of Computer Research and Development, 2015, 52(8): 1893-1901. DOI: 10.7544/issn1000-1239.2015.20140605
    [6]Lu Yang and Li Jiguo. Efficient and Provably-Secure Certificate-Based Key Encapsulation Mechanism in the Standard Model[J]. Journal of Computer Research and Development, 2014, 51(7): 1497-1505.
    [7]Ge Lirong, Yu Jia, Cheng Xiangguo, Hao Rong, Zhao Huiyan, Li Meng. Strong Key-Insulated Signature Scheme Supporting Multi-Helpers in the Standard Model[J]. Journal of Computer Research and Development, 2014, 51(5): 1081-1088.
    [8]Wang Zhiwei and Zhang Wei. ID Based Signature Scheme from Strong RSA Assumption in the Standard Model[J]. Journal of Computer Research and Development, 2013, 50(2): 302-306.
    [9]Wu Qing, Zhang Leyou, Hu Yupu. A New Construction of Short Hierarchical Identity-Based Signature in the Standard Model[J]. Journal of Computer Research and Development, 2011, 48(8): 1357-1362.
    [10]Ren Yongjun, Wang Jiandong, Wang Jian, Xu Dazhuan, and Zhuang Yi. Identity-Based Authenticated Key Agreement Protocols in the Standard Model[J]. Journal of Computer Research and Development, 2010, 47(9): 1604-1610.
  • Cited by

    Periodical cited type(11)

    1. 申远,宋伟,赵常胜,彭智勇. 支持访问行为身份追踪的跨域密文共享方案. 计算机研究与发展. 2024(07): 1611-1628 . 本站查看
    2. 刘雪娇,殷一丹,陈蔚,夏莹杰,许佳丽,韩立东. 基于区块链的车联网数据安全共享方案. 浙江大学学报(工学版). 2021(05): 957-965 .
    3. 郭丽峰,杨晓丽. 免密钥托管的可追踪属性基加密方案. 山西大学学报(自然科学版). 2021(04): 681-687 .
    4. 石宇清,凌捷. 用户和属性授权机构可追责的在线/离线属性基加密方案. 计算机科学. 2020(04): 292-297 .
    5. 刘晓健,赵亮. 多维网络信息流量式泄露高效检测方法仿真. 计算机仿真. 2020(05): 448-452 .
    6. 施国峰,张兴兰. 面向云存储的支持范围密文搜索的属性基加密方案. 信息网络安全. 2020(06): 75-81 .
    7. 王小英,刘庆杰,庞国莉. 恶意代码攻击下多业务通信网络安全响应仿真. 计算机仿真. 2020(10): 137-141 .
    8. 郑东,张应辉. 密码技术在5G安全中的应用. 信息安全与通信保密. 2019(01): 50-58 .
    9. 迪力夏提·吾普尔,陈成,努尔买买提·黑力力. 隐藏策略的可验证外包解密OO-CP-ABE访问控制方案. 计算机工程. 2019(10): 166-170 .
    10. 王悦,樊凯. 隐藏访问策略的高效CP-ABE方案. 计算机研究与发展. 2019(10): 2151-2159 . 本站查看
    11. 苗田田,杨惠杰,沈剑. 电子医疗环境中支持用户隐私保护的访问控制方案. 网络空间安全. 2019(10): 16-22 .

    Other cited types(9)

Catalog

    Article views (1386) PDF downloads (674) Cited by(20)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return