创新点
本文提出了一种新的“cancellation technique”,并将该新技术用于构造黑盒可追踪和可撤销的密文策略属性基加密方案的构造中,在不牺牲其他参数(公开参数长度、密钥长度等)的情况下,本文构造出一个(与当前最好结果相比)更短密文、更小计算代价的黑盒可追踪与可撤销密文策略属性基加密方案。值得一提的是,这种新的“cancellation technique”不仅仅在构造更短密文更高效的黑盒可追踪与可撤销密文策略属性基加密方案中起作用,同时也对其他加密或签名方案更短密文或者是更高效的构造提供了参考价值。
References
Liu Z, Cao Z F, Wong D C S. White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures. IEEE Trans Inf Foren Secur, 2013, 8: 76–88
Ning J T, Cao Z F, Dong X L, et al. Large universe ciphertext-policy attribute-based encryption with white-box traceability. In: Computer Security-ESORICS 2014. Berlin: Springer, 2014. 55–72
Ning J T, Dong X L, Cao Z F, et al. Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud. In: Computer Security–ESORICS 2015. Berlin: Springer, 2015. 270–289
Ning J T, Dong X L, Cao Z F, et al. White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans Inf Foren Secur, 2015, 10: 1274–1288
Liu Z, Cao Z F, Wong D C S. Traceable cp-abe: how to trace decryption devices found in the wild. IEEE Trans Inf Foren Secur, 2015, 10: 55–68
Liu Z, Cao Z F, Wong D C S. Blackbox traceable cpabe: how to catch people leaking their keys by selling decryption devices on ebay. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2013. 475–486
Garg S, Kumarasubramanian A, Sahai A, et al. Building efficient fully collusion-resilient traitor tracing and revocation schemes. In: Proceedings of the 17th ACM Conference on Computer and Communications Security. New York: ACM, 2010. 121–130
Author information
Authors and Affiliations
Corresponding author
Additional information
The authors declare that they have no conflict of interest.