Cryptology ePrint Archive: Report 2014/676
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts
Zhen Liu and Zhenfu Cao and Duncan S. Wong
Abstract: Recently a series of expressive, secure and efficient Attribute-Based Encryption (ABE) schemes, both in key-policy flavor and ciphertext-policy flavor, have been proposed.
However, before being applied into practice, these systems have to attain traceability of malicious users.
As the decryption privilege of a decryption key in Key-Policy ABE (resp. Ciphertext-Policy ABE) may be shared by multiple users who own the same access policy (resp. attribute set), malicious users might tempt to leak their decryption privileges to third parties, for financial gain as an example, if there is no tracing mechanism for tracking them down.
In this work we study the traceability notion in the setting of Key-Policy ABE, and formalize Key-Policy ABE supporting fully collusion-resistant blackbox traceability. An adversary is allowed to access an arbitrary number of keys of its own choice when building a decryption-device, and given such a decryption-device while the underlying decryption algorithm or key may not be given, a Blackbox tracing algorithm can find out at least one of the malicious users whose keys have been used for building the decryption-device.
We propose a construction, which supports both fully collusion-resistant blackbox traceability and high expressiveness (i.e. supporting any monotonic access structures). The construction
is fully secure in the standard model (i.e. it achieves the best security level that the conventional non-traceable ABE systems do to date), and
is efficient that the fully collusion-resistant blackbox traceability is attained at the price of making ciphertexts grow only sub-linearly in the number of users in the system, which is the most efficient level to date.
Category / Keywords: public-key cryptography / Attribute-Based Encryption, Key-Policy, Blackbox Traceability, Efficiency
Date: received 4 Aug 2014, last revised 18 Aug 2014
Contact author: liuzhen sjtu at gmail com, zfcao@cs sjtu edu cn, duncan@cityu edu hk
Available format(s): PDF | BibTeX Citation
Version: 20140830:121905 (All versions of this report)
Short URL: ia.cr/2014/676
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]