The Community for Technology Leaders
Green Image
Issue No. 11 - Nov. (2012 vol. 23)
ISSN: 1045-9219
pp: 2150-2162
Yi Mu , University of Wollongong, Wollongong
Willy Susilo , University of Wollongong, Wollongong
Jinguang Han , University of Wollongong, Wollongong and Hohai University, Nanjing
Jun Yan , University of Wollongong, Wollongong
ABSTRACT
Decentralized attribute-based encryption (ABE) is a variant of a multiauthority ABE scheme where each authority can issue secret keys to the user independently without any cooperation and a central authority. This is in contrast to the previous constructions, where multiple authorities must be online and setup the system interactively, which is impractical. Hence, it is clear that a decentralized ABE scheme eliminates the heavy communication cost and the need for collaborative computation in the setup stage. Furthermore, every authority can join or leave the system freely without the necessity of reinitializing the system. In contemporary multiauthority ABE schemes, a user's secret keys from different authorities must be tied to his global identifier (GID) to resist the collusion attack. However, this will compromise the user's privacy. Multiple authorities can collaborate to trace the user by his GID, collect his attributes, then impersonate him. Therefore, constructing a decentralized ABE scheme with privacy-preserving remains a challenging research problem. In this paper, we propose a privacy-preserving decentralized key-policy ABE scheme where each authority can issue secret keys to a user independently without knowing anything about his GID. Therefore, even if multiple authorities are corrupted, they cannot collect the user's attributes by tracing his GID. Notably, our scheme only requires standard complexity assumptions (e.g., decisional bilinear Diffie-Hellman) and does not require any cooperation between the multiple authorities, in contrast to the previous comparable scheme that requires nonstandard complexity assumptions (e.g., q-decisional Diffie-Hellman inversion) and interactions among multiple authorities. To the best of our knowledge, it is the first decentralized ABE scheme with privacy-preserving based on standard complexity assumptions.
INDEX TERMS
Encryption, Protocols, Access control, Polynomials, Educational institutions, privacy, Attribute-based encryption, multiauthority, privacy-preserving extract protocol, access control
CITATION
Yi Mu, Willy Susilo, Jinguang Han, Jun Yan, "Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption", IEEE Transactions on Parallel & Distributed Systems, vol. 23, no. , pp. 2150-2162, Nov. 2012, doi:10.1109/TPDS.2012.50
109 ms
(Ver 3.1 (10032016))