Netinfo Security ›› 2019, Vol. 19 ›› Issue (5): 47-53.doi: 10.3969/j.issn.1671-1122.2019.05.006

Previous Articles     Next Articles

Ciphertext Policy Attribute-based Encryption Scheme Supporting Traitor Tracing

Xixi YAN1(), Qichao ZHANG1, Yongli TANG1, Qinlong HUANG2   

  1. 1. School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo Henan 454003, China
    2. School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
  • Received:2018-05-03 Online:2019-05-10 Published:2020-05-11

Abstract:

Attribute-based encryption(ABE) which can realize fine-grained access control by matching the access structure with attribute set meets the demand of secret data sharing in “one-to-many” environment. So it is widely used in the field of cloud computing, big data, privacy protection and so on. However, there are cases in which a traitor(or a malicious user) leaks a private key to obtain an illegal benefit in practical use. To solve this problem, a ciphertext policy attribute-based encryption scheme supporting traitor tracing is proposed in the paper. Based on the ABE scheme proposed by IBRAIMI, the Boneh-Boyen signature algorithm is introduced in the private key generation algorithm to track the traitor. The scheme is proved to be secure against chosen plaintext attack under DBDH assumption. The performance analysis shows that the size of the ciphertext and the private key are reduced, and the cost of computation and communication are optimized. Therefore, the scheme has higher theoretical significance and application values in file sharing, electronic medical records, and so on.

Key words: attribute-based encryption, traitor tracing, ciphertext strategy, DBDH assumption

CLC Number: