1. Introduction
With the technical development of distributed storage and virtualization, more and more users tend to move their data to the cloud [1]. The cloud center contains massive private data of users, hence special encryption techniques should be implemented to protect the privacy and confidentiality of these sensitive data from being attacked. However, traditional cryptosystem can hardly meet a serious of new demands which emerge in cloud computing systems. Under this situation, attribute based encryption (ABE) [2] is proposed and has been divided into two mechanisms: KP-ABE [6-7] [23-24] and CP-ABE [3] [22]. Among the two kinds of ABE mechanisms, CP-ABE is considered more appropriate in terms of data protection in cloud computing, since it is equipped with the ability of providing flexible self-centric data access management. In CP-ABE, the private keys of a user corresponds with the attributes he owns, while the ciphertext corresponds a self-centric access policy which is made by the data owner. A data receiver is capable of decrypting the encrypted file provided that the attributes he possesses match with the policy.
However, key abuse [19] is a challenging issue in attribute based cryptosystem. ABE is an advanced type of broadcast encryption, users possessing the same attributes share the same private keys. There may exist some traitors expose their private keys illegally without being detected, which will threaten the security of the whole system. Key abuse issues remain in many current ABE schemes as the private keys generated are rarely associated with any users’ specific identifiers. One method is to assign each user a unique pair of attribute public key and private key, when private key exposure happens, the identity of traitor can easily be traced. However, if this mechanism is introduced, the encryption cost will be enormous and the advantages of ABE will no longer exist. Thus, it is essential to propose a scheme which takes the advantage of ABE as well as meets the demands of distinguishing different users by the private keys they possess.
Existing researches concerning ABE have achieved much progress with regard to fine-grained access control [4-5] [15], flexible attribute revocation [9] [14], data authentication [8] [16], etc. However, key exposure accountability and key exposure protection in ABE have not received much concern. Some schemes have successfully achieved user accountability in ABE [10-13], but the computation cost and the size of private keys in their schemes are too large, which make them impractical to be totally applied to some sceneries with constrained computing resources such as wireless networks, mobile cloud computing, etc. Besides, although schemes in [10-13]are capable of tracing the malicious user when key exposure happens, the system will still be at risk since there doesn’t exist effective key updating mechanisms to guarantee forward and backward security. If the private key owned by valid user is leaked, any other user obtaining it can decrypt the corresponding ciphertext since the leaked private key is still a valid one. Consequently, all the potential threat calls for frequent key refreshing in attribute based cryptosystem. When key exposure happens, effective and efficient key updating mechanism should be implemented to keep the system from potential threat. Consequently, a scheme equipped with both user accountability and secure key updating is urgently to be put forward.
To better tackle the issues discussed above, in this paper, we propose a key-insulated ciphertext based attribute based encryption with key exposure accountability (KI-CPABE-KEA) scheme. In our scheme, a unique identifier is embedded into each user’s private key. If a malicious user leaks his private key for illegal data sharing, the system manger can pinpoint the exact identity of the traitor. We introduce key-insulation mechanism into our scheme and divide the system lifetime into several discrete time periods. When time period evolves, only part of the private keys have to be updated and the system public parameters remain unchanged. Due to the key-insulation mechanism, our scheme is very efficient with regard to key updating computation cost as well as provides key exposure protection when key leakage happens. Moreover, our KI-CPABE-KEA is proved to be secure under DBDH assumption. The higher performance makes our scheme more appropriate for secure data protection in cloud computing.
The rest of paper is arranged as follows:
Section 2 reviews relevant research related to ABE with user accountability and gives the background of some fundamental preliminaries which are used to construct our scheme. Section 3 illustrates the model of our KI-CPABE-KEA and makes some essential security definitions. Section 4 contains a full description of the algorithms in KI-CPABE-KEA along with the correctness proof. Section 5 presents the security analysis and evaluates our scheme with respect to computation efficiency. In section 6, the conclusion of this paper and future prospects are made.
2. Related works and preliminaries
2.1 Related works
The notion of ABE was first put forward in [1]. In ABE, user’s access privileges are described by a numebr of attributes rather than an identity string. A user can get access to the ciphertext only if his attributes match with the access structure which is made by the data owner.Equipped with the advantages of providing flexible data control, ABE is widely implemented as an effective tool for secure data sharing between users in different application scenarios [14] [18] [20].
Key exposure is a challenging problem in ABE. M. J. Hinek et al. in [10] first proposed a token-based ABE which provides key exposure accountability. In their scheme, user’s keys consists of two parts: private keys and delegation keys. User’s delegation key is embedded with user’s unique identifier, but the contribution of delegation agent will add more computation cost to the whole system. Jin et al. in [11] tackled the key exposure problem by proposing an accountable and anonymous CP-ABE scheme. In their scheme, the identity of the traitor can be traced in a black-box model. Their scheme is provably secure under DBDH assumption. Based on [11], Fatos et al. in [12] achieved user accountability in CP-ABE and apply their scheme to PHR systems. In their scheme,a unique identifier is inserted into user’s decryption key, if a malicious PHR user leaks his private key deliberately to other unauthorized users, the identity of the malicious user can be exactly traced. Wang et al. in [13] proposed a key-policy ABE with user accountability. The identity of traitor can be traced by a white-box setting, but the overhead of encryption and decryption is too large.
Besides, although the above schemes have achieved user accountability, they haven’t taken backward and forward security into full consideration when key exposure happens, which may bring serious security risks to the system. If the private key owned by a malicious user is leaked, any user obtaining the private key can decrypt the corresponding ciphertext since the leaked private key is a valid one. Thus, when key exposure happens, the identity of the malicious user should be exactly pinpointed by the system manager; more importantly, effective and efficient key updating mechanism should be implemented to keep the system secure.The mechanism of key-insulation was initially proposed in [21]. Key-insulation is a promising tool to guarantee forward and backward security as well as achieves high efficiency of key updating. In this mechanism, the lifespan of a cryptosystem is partitioned by several discrete time periods. The public parameters remain unaltered during the whole time periods, while private keys are updated when system enters into a new time period. Key-insulation mechanism can provide full security when user’s private key exposure happens, which can also be introduced to provide key exposure protection in attribute based cryptosystem[25].
2.2 Hardness assumptions
a. Discrete Logarithm Assumption (DL):
Given X, P ∈ G, it is computational infeasible to calculate the value of such that X = Pa with a non-negligible probability within probabilistic polynomial-time.
b. Decision Bilinear Diffie-Hellman problem (DBDH).
For given (g,ga,gb,gc,z), it is computational infeasible to distinguish the following tuples ( A = ga, B = gb, C = gc, ê(g, g)abc ) and ( A = ga, B = gb, C = gc, ê(g, g)z) with non-negligible probability within probabilistic polynomial-time.
3. Models and assumptions
3.1 The model of our KI-CPABE-KEA
As is shown in Fig. 1, the model includes 6 entitles: CSP (cloud service provider), AA (attribute authority), key helper, tracer, data owner and data receiver.
Fig. 1.The model of our KI-CPABE-KEA
CSP assigns a global unique identifier to each user in the system and responses to the data requests made by users. AA manages the global attributes in the system. Meanwhile, AA generates initial private key for a user according to the attribute set and the unique identifier he owns. Key helper generates the key updating component for each user when system evolves into a new time period. Data owner encrypts his file using a policy and transfers the encrypted data to CSP. Data receiver sends access request to CSP and decrypts the ciphertext under the condition that the attributes he owns match with the encryption policy .When a malicious user in the system leaks his private key deliberately for the purpose of illegal data sharing, tracer can pinpoint the exact identity of the malicious user according to the exposed private key.
3.2 Formulized definitions of algorithms
Our KI-CPABE-KEA includes five algorithms.
Setup(1φ)→{PK, MK, HK} : This algorithm takes a parameter φ as input, it returns the system public parameter PK, master key MK and helper key HK.
Initial private key generation{PK, MK, {Ai}, id, TP0}→{SKid,TP0} : On input the system public key PK, the master key MK, initial time period TP0 and a user’s id with attribute set {Ai}, AA outputs SKid,TP0 as the initial private key of a user.
Key update{TPn, TPn+1, HK, {Ai}, SKid,TPn}→{UPi,,TPn+1, SKid,TPn}:The algorithm takes two time periods TPn, TPn+1,attribute set {Ai} and HK as input, it outputs the key updating component UPi,TPn+1.Users update their temporal private keys to the lasted version by calculating SKTPn+1 = SKid,TPn∙UPi,,TPn+1.
Encrypt {PK, M, γ}→{CT} : This algorithm takes the systems public parameter PK, a plaintext M, and an encryption policy γ as input. Then the algorithm outputs a ciphertext CT.
Decrypt{SKid,TPn, CT}→{M}: The algorithm takes CT and receiver’s temporal private key SKid,TPn as input, it outputs the plaintext M.
3.3 Security model
Definition: Our KI-CPABE-KEA has the essential confidentiality in selective model there exists an Adversary has unneglectable advantage in winning the following game:
Phase 1 Setup:
Adversary claims an access structure γic and {Aic} is the attribute set involved.
Challenger runs Setup procedure to obtain the system parameters PK and master key MK. It sends PK to Adversary.
Phase 2 Queries:
Adversary can ask for the result of the following queries to Challenger:
Initial private key generation query: Challenger can obtain initial private key for attribute set S by running Initial private key generation algorithm and sends the results back to Adversary. Note that |S∩{Aic}| < thrx, thrx is the threshold value of each node x in the γic.
Temporal private key generation query: Challenger can obtain temporal private key for attribute set S by running Key update algorithms and sends the results back to Adversary. Note that |S∩{Aic}| < thrx, thrx is the threshold value of each node x in the γic.
The queries described in phase 2 can be asked by Adversary for a bounded times.
Phase 3 Challenge:
At the current time period TPn, Adversary picks M0 andM1,which haven’t queried before. Challenger chooses σ ∈ {0,1} randomly and calculates CT∗ = Encrypt{PK, Mσ, γic} .Then Challenger sends the result back to Adversary.
Adversary outputs a value σ∗ as a conjecture of σ. If σ∗=σ then Adversary wins the game. Adversary cannot ask Challenger for Temporal private key generation query for the challenging attribute set {Aic}.
Denote to be the advantage in the challenge game.
4. Constructions
The concrete constructions of our KI-CPABE-KEA are described as follows:
Setup: Let G1 and G2 be two cyclic groups with prime order p. Denote g is the generator of G1.Let ê∶G1×G1→G2 be a bilinear pairing. Define a Lagrange interpolation function Define a hash function: H1:{0,1}∗→G1. AA randomly chooses For each attribute Ai, AA randomly chooses Key helper picks as its master key and calculates gh. The system master keys are {ti,β,u,gy,h}, system public parameters are {G1,G2,p,g,ê,gh,ê(g,g)y,gu,H1,gβ}.
Initial private key generation : At initial time period TP0, AA generates the initial private key SKid,TP0 for a user possessing attribute set {Ai} as follows:
Note that remain unchanged throughout the whole system lifetime, while Di,TPn updates when system enters a new time period.
Key update: In order to update user’s private key from time period TPn−1 to TPn,key helper calculates the updated key component Ui,TPn for each attribute i as and delivers it to users. Users update their temporal private keys to the latest version by calculating Di,TPn =Di,TPn−1∙UPi,TPn. The format of temporal private key at TPn can be denoted by:
Encrypt : Data owner randomly chooses a polynomial qx for each node x in the access control structure γ. Denote dx to be the degree of qx and thrx to be the threshold value node. Let dx=thrx−1. For the root node data owner sets qroot(0)=s. For any other node (except for root node) in γ, let qx(0)=qparent(x)index(x). Let {i} to be the leaf nodes in γ, then the ciphertext is constructed as:
Data owner uploads the ciphertext CT ={C0,C1,C2,C1,i,C1,i} to cloud service provider.
Decrypt : Upon receiving CT {C0,C1,C2,C1,i,C1,i} from cloud service provider, data receiver decrypts the ciphertext by calculating:
Correctness proof:
For each leaf node in the γ,we have:
For each non-leaf node, let i=index(z), Sx'={index(z):z∈Sx}.
Thus, the algorithm recovers the value of Froot = ê(g,g)rs using Lagrange interpolation function. Then the plaintext can be recovered by:
5. Security proof and performance analysis
5.1 Security proof:
Theorem: If our scheme can be broken by Adversary in the selective model, then a simulator can be constructed to break the DBDH hardness assumption with an unneglectable advantage.
Proof: In the challenge game, if there exists an Adversary which has advantage ε in attacking our KI-CPABE-KEA, there exists a simulator which is capable of breaking the DBDH hardness assumption with an advantage of ε/2.
The simulator is constructed as follows:
Phase 1 Setup:
Defines a global attribute set U={1,2,…i}.Defines G1 and G2 be two cyclic groups of prime order p. The generator of G1 is denoted by g. Defines a bilinear pairing ê:G1×G1→G2. Defines a hash function H1:{0,1}∗→G. Randomly picks μ∈{0,1}, a,b,c,z∈Zp.
Simulator sets the public parameters as follows:
The aim of simulator is to output a value μ∗ as a guess of μ.
Adversary defines an attribute set {Aic} with an encryption policy γic and plays the challenge game in it. Simulator acts as Challenger and runs Adversary as a subprogram.
Phase 2: Queries
Adversary can make the following queries to simulator:
Initial private key generation query: Adversary submits queries for initial private key generation for an attribute set S(provided |S∩{Aic}| Simulator picks and sets SKid,TP0 as follows: Simulator sends SKid,TP0 to Adversary. Temporal private key generation query: Adversary submits queries for temporal private key generation for an attribute set S. Simulator responds SKid,TPn as follows: Adversary can make a bounded queries as described above. It can be seen that the simulator is consistent with our scheme. Challenger : Adversary picks plaintexts M0 and M0. Simulator chooses σ∈{0,1} and calculates CTσ = Encrypt {PK,Mσ,γic}. The encryption process is as follows: Randomly chooses a polynomial qx for each node x in the user’s access control structure γic. Denote dx to be the degree of qx and thrx to be the threshold value of each node. Let dx=thrx−1. Simulator sets qroot (0)=s for the root node. For any other node (except for root node) in the access tree, let qx(0)=qparent(x)index(x). Denote {ic} to be the leaf node of γic, the ciphertext CTσ is constructed as: Let s = c, according to setting in Setup phase, CTσ equals to : When σ=0, CTσ is a legal ciphertext in our model. Adversary outputs a value σ∗ as a guess of σ. If σ∗=σ, Adversary wins the game and the advantage can be denoted by: Then we will discuss simulator’s advantage in distinguishing the following two tuples {A=ga,B=gb,C=gc,ê(g,g)abc} and {A=ga,B=gb,C=gc,ê(g,g)z}. When σ=1, CTσ is a invalid ciphertext and Adversary cannot acquire useful information of σ. Under this condition the advantage can be denoted by: Since when σ∗≠σ, the simulator outputs μ=1, so: When σ=0,CTσ is a legal ciphertext. According to the assumption, Adversary has an advantage ε. Under this condition the advantage can be denoted by: Because when σ∗=σ the simulator outputs μ=0, so: As is mentioned above, the advantage of simulator in breaking the DBDH assumption is: In our KI-CPABE-KEA, a specific random number chosen by AA is embedded into each user’s private key, consequently, it is computational infeasible combine them to decrypt a valid ciphertext. As is discussed in section 4, to decrypt a ciphertext, it is essential for the colluding attacker to recover the value of ê(g,g)ys. To achieve this goal, the attacker must pair the ciphertext and the other colluding users’ private keys for an attribute (assume that the attribute is not owned by attacker). However, this results in the value ê(g,g)ys=ê(g,g)(y−r)s ∙ê(g,g)r hidden by a random value r, which is uniquely distributed to users in the cloud system. This value is able to be calculated only when the corresponding private key components a user possesses satisfy with the encryption policy embedded in the ciphertext. Consequently, the target value ê(g,g)ys cannot be calculated by collusion attack due to the hidden value is uniquely distributed in the private keys of each user. Our KI-CPABE-KEA not only achieves efficient key updating at a very low cost, but also guarantees the forward security and backward security when attribute revocation or key exposure happens. Assume that user’s attribute Ai has to be revoked after the time period TPn,then he will no longer receives the key updating information UPi,TPn+1 from the key helper, consequently, he cannot update his temporal private key SKid,TPn to the latest version. When key exposure happens at period TPn, the system can still maintain its security by updating users’ temporal private keys to TPn+1 version. Without loss of generality, when a user’s private key leaks during period TPn, the system still maintains safely after TPn since all the temporal private keys have been securely updated. This meets the requirements of both forward security and backward security. Besides, our scheme also supports random access key updating since key helper is capable of updating users’ temporal private keys from any previous time periods(denote these time periods by TPa) to the lasted version in just one step by calculating Then we will discuss the computation cost of key updating in our key-insulated scheme. When period TPn+1 arrives, key helper calculates and sends it to user. User updates his private key by calculating Di,TPn+1=Di,TPn∙UPi,TPn+1. During the whole key updating process, for each attribute key helper has to run 2 hash operation and 1 exponential operation, user only runs 1 multiply operation. Compared with many ABE schemes with key refreshing mechanism, our scheme has lower computation in the key updating process. Besides, the system parameters remain unchanged during the system lifetime, and the key updating process only needs the participation of key helper and user, which relieves AA from the heavy computation load of key-regeneration. When a malicious user (denote mid as his unique identity and SKmid,TPn as the private key he owns) leaks his private key deliberately in the cloud system for illegal data sharing, then his identity can be exactly pinpointed by tracer. Two main methods can be adopted for traitor tracing as follows: a.Upon receiving a legal private key from CSP, tracer firstly recovers the attribute set belonging to the malicious user from and calculates gr as follows: Then, the identity can be pinpointed by: Correctness proof: b.Since user’s private key is unique, if the amount of users is not huge, tracer can build a list recoding each private key with its corresponding user’s identity as Table 1 shows. When private key exposure happens, tracer searches the identifier which corresponds to the leaked private key in the list and the traitor is able to be exactly traced. Table 1.List of each private key with its corresponding user’s identity In attribute based cryptosystem, the pairing operation and the exponential operation will consume more computation cost than other operations [17]. Thus, reducing the number of pairing operation and exponential operation will increase the efficiency of the algorithm to a large extent. In our scheme, according to the Encrypt algorithm, the data owner needs to run 3n+3 times of exponential operation (assuming the amount of attributes concerned in encryption is n). While in decryption, each data receiver takes 3n+2 times of pairing operation. With regard to the sizes of private keys and ciphertext, according to Initial private key generation and Encrypt algorithms, the size of private key for a single user is 2n+1|p|, and the size of ciphertext is 3n+2|p|. We denote “Exp” as exponential operation and “Pair” as pairing operation, the performance comparison results with schemes in [12] and [26] are listed in Table 2. Table 2.Efficiency comparison From Table 2, it can be figured out that the overall computation cost of encryption and decryption is lower in our scheme. Besides, our scheme outperforms with respect to the sizes of private key and ciphertext. As is discussed above, the overall efficiency of our scheme is higher compared to previous schemes in [12][26]. We center on the demand of key exposure protection in attribute based cryptosystem and construct a key-insulated ciphertext policy attribute based encryption with key exposure accountability (KI-CPABE-KEA) for secure data protection in cloud computing. When a malicious user leaks his private key deliberately for illegal data sharing, the tracer can pinpoint his identity exactly. Besides, the key-insulation mechanism guarantees forward and backward security when key exposure happens. The higher efficiency with proved security make our KI-CPABE-KEA more appropriate for secure data sharing in cloud computing. Our future research direction should focus on the key-insulated attribute based signature, which serves as an effective tool for data authentication in attribute based cryptosystem.5.2 Collusion resistance
5.3 Forward and backward security with efficient key updating
5.4 Traitor tracing
5.5 Efficiency comparison
6. Conclusion
References
- Han ND, Han LZ, Tuan DM, In HP and Jo M, "A scheme for Data Confidentiality in Cloud-assisted Wireless Body Area Networks,” Information Sciences, vol. 284, no.10, pp 157-166, Nov., 2013. Article (CrossRef Link)
- V. Goyal, O. Pandey, A. Sahai and B. Waters, "Attribute Based Encryption for Fine-Grained Access Control of Encrypted Data," in Proc. of ACM conference on Computer and Communications Security, pp. 89-98, Oct.30-Nov.3, 2006. Article (CrossRef Link)
- Waters, B, "Ciphertext policy attribute based encryption: an expressive, efficient, and provably secure realization," in Proc. of Int. Conf. PKC 2011, pp. 53-70, Mar. 6-9, 2011. Article (CrossRef Link)
- A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption," Advances in Cryptology—EUROCRYPT 2010, pp. 62-91, Springer, Berlin, Germany, May 30-Jun.3, 2010. Article (CrossRef Link)
- A. Lewko and B. Waters, “Decentralizing attribute-based encryption,” Advances in Cryptology–EUROCRYPT 2011, pp.568–588, May 15-19, 2011. Article (CrossRef Link)
- Attrapadung N, Libert B, De Panafieu E, "Expressive key-policy attribute-based encryption with constant-size ciphertexts," Public Key Cryptography—PKC 2011, vol. 6571 of LNCS. Springer, pp. 90-108, Mar. 6-9, 2011. Article (CrossRef Link)
- J. Han, W. Susilo, Y. Mu, and J. Yan, "Privacy-preserving decentralized key-policy attribute-based encryption," in Proc. of 2012 IEEE Transactions on Parallel and Distributed Systems, vol.23, no.11, pp.2150-2162, Nov.,2012. Article (CrossRef Link)
- Chunqiang Hu, Nan Zhang, “Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme,” IEEE Journal on Selected Areas in Communications/SUPPLEMENT, vol.31, no.9, pp 37-46, Sep., 2013. Article (CrossRef Link) https://doi.org/10.1109/JSAC.2013.SUP.0513004
- Hur J, Noh D K., “Attribute-based access control with efficient revocation in data outsourcing systems,” Transactions on Parallel and Distributed Systems, IEEE, vol.22,no.7, pp. 1214-1221, Jul.,2011. Article (CrossRef Link) https://doi.org/10.1109/TPDS.2010.203
- M. Jason Hinek, Shaoquan Jiang, Reihaneh Safavi-Naini, "Attribute-Based Encryption with Key Cloning Protection," Available at http://eprint.iacr.org/2008/478
- Jin Li, Kui Ren, Bo Zhu, “Privacy-Aware Attribute-Based Encryption with User Accountability,” Volume 5735 of the series Lecture Notes in Computer Science, pp. 347-362, Sep.7-9, 2009. Article (CrossRef Link)
- Fatos Xhafa, Jianglang Feng, Yinghui Zhang, “Privacy-aware attribute-based PHR sharing with user accountability in cloud computing,” Journal of Supercomputing, vol.71, no.5:pp.1607–1619, May, 2015. Article (CrossRef Link) https://doi.org/10.1007/s11227-014-1253-3
- YongTao Wang, KeFei Chen, Yu Long, “Accountable authority key policy attribute-based encryption,” Science China Information Sciences, Vol. 55, Issue 7, pp. 1631-1638, Jul., 2012. Article (CrossRef Link) https://doi.org/10.1007/s11432-012-4594-7
- LI Ming, YU Shucheng, et al., “Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption,” IEEE Transactions on Parallel and Distributed Systems, vol.24, no.1: 131-143, Jan., 2013. Article (CrossRef Link) https://doi.org/10.1109/TPDS.2012.97
- Yu S, Wang C, Ren K, et al., "Attribute based data sharing with attribute revocation," in Proc. of the 5th Symposium on Information, Computer and Communications Security (ACM), pp. 261-270, Apr.13-16,2010. Article (CrossRef Link)
- Ximeng Liu, Hui Zhu, Jianfeng Ma, "Attribute Based Multisignature Scheme for Wireless Communications," available at http://www.hindawi.com/journals/misy/2015/827320/. Article (CrossRef Link)
- Chen L, Cheng Z, and Smart N P., “Identity-based key agreement protocols from Pairings,” International Journal of Information security, vol.6, no.4, pp. 213-241, Jul., 2007. Article (CrossRef Link) https://doi.org/10.1007/s10207-006-0011-9
- J.-M. Do, Y.-J. Song, and N. Park, "Attribute Based Proxy Re-Encryption for Data Confidentiality in Cloud Computing Environments," in Proc. of First ACIS/JNU Int'l Conf. Computers, Networks, Systems and Industrial Eng. (CNSI), pp. 248-251, May, 2011. Article (CrossRef Link)
- Shucheng Yu, Kui Ren, Wenjing Lou, "Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems," the series Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 19, pp.311-329, Sep. 14-18, 2009. Article (CrossRef Link)
- S. Yu, K. Ren, and W. Lou, “FDAC: toward fine-grained distributed data access control in wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 22,no. 4, pp. 673–686, Apr., 2011. Article (CrossRef Link) https://doi.org/10.1109/TPDS.2010.130
- Dodis Y, Katz J, Xu S, Yung M. "Key-Insulated public-key cryptosystems," in Proc. of the Eurocrypt 2002. LNCS 2332, Berlin: Springer-Verlag, pp.65−82, Apr. 28-May 2, 2002. Article (CrossRef Link)
- Ximeng Liu, Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong, “Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption,” Security and Communication Networks, vol. 8, no.18, pp. 4098-4109, Dec., 2015. Article (CrossRef Link) https://doi.org/10.1002/sec.1326
- Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong, Ximeng Liu, “Large universe decentralized key-policy attribute-based encryption,” Security and Communication Networks, vol.8, no.3, pp. 501-509, Feb., 2015. Article (CrossRef Link) https://doi.org/10.1002/sec.997
- Sahai, A, Waters, "Fuzzy identity-based encryption," in Proc. of Int. Conf.EUROCRYPT 2005, pp. 457-473, May 22-26, 2005. Article (CrossRef Link)
- Hanshu Hong, Zhixin Sun, “High efficient key-insulated attribute based encryption scheme without bilinear pairing operations,” SpringerPlus, vol.5, no.1, pp.1-12, Dec., 2016. Article (CrossRef Link) https://doi.org/10.1186/s40064-015-1659-2
- Jianting Ning, Xiaolei Dong, Zhenfu Cao, “White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 6, pp.1274-1288, Jun., 2015. Article (CrossRef Link) https://doi.org/10.1109/TIFS.2015.2405905
Cited by
- A Key-Insulated Ciphertext Policy Attribute Based Signcryption for Mobile Networks vol.95, pp.2, 2016, https://doi.org/10.1007/s11277-016-3825-4
- Provably secure attribute based signcryption with delegated computation and efficient key updating vol.11, pp.5, 2017, https://doi.org/10.3837/tiis.2017.05.019
- Ontology Based Privacy Preservation over Encrypted Data using Attribute-Based Encryption Technique vol.6, pp.2, 2021, https://doi.org/10.25046/aj060244