Removing escrow from ciphertext policy attribute-based encryption

Cited 19 time in webofscience Cited 19 time in scopus
  • Hit : 481
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorHur, Junbeomko
dc.contributor.authorKoo, Dongyoungko
dc.contributor.authorHwang, Seong Ounko
dc.contributor.authorKang, Kyungtaeko
dc.date.accessioned2013-08-08T01:52:00Z-
dc.date.available2013-08-08T01:52:00Z-
dc.date.created2013-07-24-
dc.date.created2013-07-24-
dc.date.issued2013-05-
dc.identifier.citationCOMPUTERS & MATHEMATICS WITH APPLICATIONS, v.65, no.9, pp.1310 - 1317-
dc.identifier.issn0898-1221-
dc.identifier.urihttp://hdl.handle.net/10203/174141-
dc.description.abstractAttribute-based encryption (ABE) is a promising cryptographic primitive for fine-grained access control of distributed data. In ciphertext policy attribute-based encryption (CP-ABE), each user is associated with a set of attributes and data are encrypted with access policies on attributes. A user is able to decrypt a ciphertext if and only if his attributes satisfy the access policy embedded in the ciphertext. However, key escrow is inherent in ABE systems. A curious key generation center in that construction has the power to decrypt every ciphertext. We found that most of the existing ABE schemes depending on a single key authority suffer from the key escrow problem. In this study, we propose a novel CP-ABE key issuing architecture that solves the key escrow problem. The proposed scheme separates the power of issuing user keys into two parties: the key generation center and the attribute authority. In the proposed construction, the key generation center and the attribute authority issue different parts of secret key components to users through a secure two-party computation protocol such that none of them can determine the whole set of keys of users individually. We demonstrate how the proposed key issuing protocol can be applied in the existing CP-ABE scheme and resolve the key escrow problem. (C) 2012 Elsevier Ltd. All rights reserved.-
dc.languageEnglish-
dc.publisherPERGAMON-ELSEVIER SCIENCE LTD-
dc.subjectIDENTITY-BASED ENCRYPTION-
dc.subjectANONYMOUS CREDENTIALS-
dc.titleRemoving escrow from ciphertext policy attribute-based encryption-
dc.typeArticle-
dc.identifier.wosid000320291500008-
dc.identifier.scopusid2-s2.0-84877728131-
dc.type.rimsART-
dc.citation.volume65-
dc.citation.issue9-
dc.citation.beginningpage1310-
dc.citation.endingpage1317-
dc.citation.publicationnameCOMPUTERS & MATHEMATICS WITH APPLICATIONS-
dc.identifier.doi10.1016/j.camwa.2012.02.005-
dc.contributor.nonIdAuthorHur, Junbeom-
dc.contributor.nonIdAuthorHwang, Seong Oun-
dc.contributor.nonIdAuthorKang, Kyungtae-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorCiphertext policy-
dc.subject.keywordAuthorAttribute based encryption-
dc.subject.keywordAuthorRemoving escrow-
dc.subject.keywordAuthorPrivacy-
dc.subject.keywordAuthorAccess control-
dc.subject.keywordPlusIDENTITY-BASED ENCRYPTION-
dc.subject.keywordPlusANONYMOUS CREDENTIALS-
Appears in Collection
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 19 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0