Attribute specified identity-based encryption

Hao Xiong, Tsz Hon Yuen, Cong Zhang, Yi Jun He, Siu Ming Yiu

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

Abstract

Fine-grained access control of encrypted data without trusted third party is a challenging task. Using the simple attribute-based encryption has the problem of key escrow, since there exists a trusted authority who is able to generate the secret keys of all users. Delegating this ability to multiple authorities can only minimize the risk, but not eliminating the possibility that all authorities may collude. We develop a new cryptosystem called Attribute Specified Identity-Based Encryption (AS-IBE) to solve this problem. We employ the idea of certificateless encryption and extend it to the attribute-based setting. Each user chooses his own public and secret key pairs to use, in addition to his attribute-based secret key. Therefore, the authority cannot decrypt without the knowledge the user's own secret key. Yet, the resulting AS-IBE system has some fundamental differences with the original attribute-based encryption. In this paper, we give the security model for the new AS-IBE cryptosystems, and propose two variants for the construction, namely the key policy AS-IBE and ciphertext policy AS-IBE.

Original languageEnglish
Title of host publicationInformation Security Practice and Experience - 9th International Conference, ISPEC 2013, Proceedings
Pages60-74
Number of pages15
DOIs
Publication statusPublished - 2013
Externally publishedYes
EventInformation Security Practice and Experience Conference 2013 - Lanzhou, China
Duration: 12 May 201314 May 2013
Conference number: 9th
https://link.springer.com/book/10.1007/978-3-642-38033-4 (Proceedings)

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume7863
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInformation Security Practice and Experience Conference 2013
Abbreviated titleISPEC 2013
Country/TerritoryChina
CityLanzhou
Period12/05/1314/05/13
Internet address

Keywords

  • attributes
  • certificateless public key encryption
  • identity-based encryption
  • key escrow

Cite this