Skip to main content
Log in

Traceable and revocable CP-ABE with shorter ciphertexts

更短密文的可追踪与可撤销密文策略属性基加密方案

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

创新点

本文提出了一种新的“cancellation technique”,并将该新技术用于构造黑盒可追踪和可撤销的密文策略属性基加密方案的构造中,在不牺牲其他参数(公开参数长度、密钥长度等)的情况下,本文构造出一个(与当前最好结果相比)更短密文、更小计算代价的黑盒可追踪与可撤销密文策略属性基加密方案。值得一提的是,这种新的“cancellation technique”不仅仅在构造更短密文更高效的黑盒可追踪与可撤销密文策略属性基加密方案中起作用,同时也对其他加密或签名方案更短密文或者是更高效的构造提供了参考价值。

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

References

  1. Liu Z, Cao Z F, Wong D C S. White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures. IEEE Trans Inf Foren Secur, 2013, 8: 76–88

    Article  Google Scholar 

  2. Ning J T, Cao Z F, Dong X L, et al. Large universe ciphertext-policy attribute-based encryption with white-box traceability. In: Computer Security-ESORICS 2014. Berlin: Springer, 2014. 55–72

    Google Scholar 

  3. Ning J T, Dong X L, Cao Z F, et al. Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud. In: Computer Security–ESORICS 2015. Berlin: Springer, 2015. 270–289

    Chapter  Google Scholar 

  4. Ning J T, Dong X L, Cao Z F, et al. White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans Inf Foren Secur, 2015, 10: 1274–1288

    Article  Google Scholar 

  5. Liu Z, Cao Z F, Wong D C S. Traceable cp-abe: how to trace decryption devices found in the wild. IEEE Trans Inf Foren Secur, 2015, 10: 55–68

    Article  Google Scholar 

  6. Liu Z, Cao Z F, Wong D C S. Blackbox traceable cpabe: how to catch people leaking their keys by selling decryption devices on ebay. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2013. 475–486

    Google Scholar 

  7. Garg S, Kumarasubramanian A, Sahai A, et al. Building efficient fully collusion-resilient traitor tracing and revocation schemes. In: Proceedings of the 17th ACM Conference on Computer and Communications Security. New York: ACM, 2010. 121–130

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhenfu Cao.

Additional information

The authors declare that they have no conflict of interest.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ning, J., Cao, Z., Dong, X. et al. Traceable and revocable CP-ABE with shorter ciphertexts. Sci. China Inf. Sci. 59, 119102 (2016). https://doi.org/10.1007/s11432-016-0062-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-016-0062-7

关键词

Navigation