Netinfo Security ›› 2020, Vol. 20 ›› Issue (1): 33-39.doi: 10.3969/j.issn.1671-1122.2020.01.005

Previous Articles     Next Articles

Attribute-based Encryption Scheme Traced Under Multi-authority

XU Shengwei(), WANG Feijie   

  1. Beijing Electronic Science and Technology Institute, Beijing 100070, China
  • Received:2019-10-15 Online:2020-01-10 Published:2020-05-11

Abstract:

In the attribute-based encryption scheme of single-agent authorization, the authorization center is too concentrated and the load is too heavy. However, existing attribute-based encryption schemes fail to combine key tracking, access policy hiding and multi-agency licensing. Therefore, a policy-based encryption scheme with multi-agent authorization that can hide the key can be hidden. The access policy is completely hidden in the ciphertext. The malicious person cannot obtain the user’s privacy through the access structure. The key tracking is implemented under the authorization of multiple organizations. Prevent user collusion and single authority key spam. Moreover, after being tracked under multi-authorization, communication overhead and computational overhead are not significantly increased. Finally, based on the DBDH hypothesis, it is proved that the plaintext attack is safe under the standard model.

Key words: access control, attribute-based encryption, policy hiding, traceability, multi-authority

CLC Number: