• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Xu, Shengmin (Xu, Shengmin.) [1] | Yang, Guomin (Yang, Guomin.) [2] | Mu, Yi (Mu, Yi.) [3] | Liu, Ximeng (Liu, Ximeng.) [4] (Scholars:刘西蒙)

Indexed by:

EI Scopus

Abstract:

Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encryption. In CCS’13, Liu et al. proposed an attribute-based traitor tracing (ABTT) scheme with blackbox traceability which can trace decryption keys embedded in a decryption blackbox/device rather than tracing a well-formed decryption key. However, the existing ABTT schemes with blackbox traceability are based on composite order group and the size of the decryption key depends on the policies and the number of system users. In this paper, we revisit blackbox ABTT and introduce a new primitive called attribute-based set encryption (ABSE) based on key-policy ABE (KP-ABE) and identity-based set encryption (IBSE), which allows aggregation of multiple related policies and reduce the decryption key size in ABTT to be irrelevant to the number of system users. We present a generic construction of the ABTT scheme from our proposed ABSE scheme and fingerprint code based on the Boneh-Naor paradigm in CCS’08. We then give a concrete construction of the ABSE scheme which can be proven secure in the random oracle model under the decisional BDH assumption and a variant of q-BDHE assumption. © Springer Nature Switzerland AG 2018.

Keyword:

Artificial intelligence Computers Computer science Public key cryptography

Community:

  • [ 1 ] [Xu, Shengmin]Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, Australia
  • [ 2 ] [Xu, Shengmin]School of Information Systems, Singapore Management University, Singapore, Singapore
  • [ 3 ] [Yang, Guomin]Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, Australia
  • [ 4 ] [Mu, Yi]Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China
  • [ 5 ] [Liu, Ximeng]School of Information Systems, Singapore Management University, Singapore, Singapore
  • [ 6 ] [Liu, Ximeng]College of Mathematics and Computer Science, Fuzhou University, Fuzhou; Fujian, China

Reprint 's Address:

  • [xu, shengmin]institute of cybersecurity and cryptology, school of computing and information technology, university of wollongong, wollongong, australia;;[xu, shengmin]school of information systems, singapore management university, singapore, singapore

Show more details

Version:

Related Keywords:

Related Article:

Source :

ISSN: 0302-9743

Year: 2018

Volume: 11192 LNCS

Page: 182-200

Language: English

0 . 4 0 2

JCR@2005

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 10

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Online/Total:168/10033310
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1