Traceable CP-ABE : How to trace decryption devices found in the wild

Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

52 Scopus Citations
View graph of relations

Author(s)

  • Zhen Liu
  • Zhenfu Cao
  • Duncan S. Wong

Related Research Unit(s)

Detail(s)

Original languageEnglish
Article number6926830
Pages (from-to)55-68
Journal / PublicationIEEE Transactions on Information Forensics and Security
Volume10
Issue number1
Online published16 Oct 2014
Publication statusPublished - Jan 2015

Abstract

In Ciphertext-policy attribute-based encrypt- ion (CP-ABE), ciphertexts are associated with access policies, which do not have to contain the identities of eligible receivers, and attributes are shared by multiple users. CP-ABE is useful for providing fine-grained access control on encrypted data. However, it also has a practicality concern that a malicious user, with his attributes shared with other users, might leak his decryption privilege as a decryption blackbox, for some financial gain or other incentives, as there is little risk of getting caught. There are two types of decryption blackboxes that reflect different practical scenarios. A key-like decryption blackbox is associated with an attribute set S-{\cal D} and can decrypt ciphertexts with access policies satisfied by S-{\cal D}. A policy-specific decryption blackbox is associated with an access policy \mathbb {A}-{\cal D} and can decrypt ciphertexts with {\mathbb {A}}-{\cal D}. Policy-specific decryption blackbox has weaker decryption capacity than key-like decryption blackbox, but tracing it is deemed to be more difficult. In the preliminary version (in CCS 2013) of this paper, we proposed a new CP-ABE scheme which is adaptively traceable against key-like decryption blackbox. The scheme has sublinear overhead, which is the most efficient one to date supporting fully collusion-resistant blackbox traceability. The scheme is fully secure in the standard model, and supports any monotonic access structures. In this paper, we further show that the scheme is also selectively traceable against policy-specific decryption blackbox. Furthermore, and more importantly, we prove a general statement that if a CP-ABE scheme is (selectively) traceable against policy-specific decryption blackbox, it is also (selectively) traceable against key-like decryption blackbox, which implies that we now only need to focus on building CP-ABE schemes which are traceable against policy-specific decryption blackbox.

Research Area(s)

  • Blackbox, CP-ABE, Key-like, Policy-specific, Traceability

Citation Format(s)

Traceable CP-ABE : How to trace decryption devices found in the wild. / Liu, Zhen; Cao, Zhenfu; Wong, Duncan S.

In: IEEE Transactions on Information Forensics and Security, Vol. 10, No. 1, 6926830, 01.2015, p. 55-68.

Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review