Security analysis of a privacy‐preserving decentralized ciphertext‐policy attribute‐based encryption scheme. (18th August 2015)
- Record Type:
- Journal Article
- Title:
- Security analysis of a privacy‐preserving decentralized ciphertext‐policy attribute‐based encryption scheme. (18th August 2015)
- Main Title:
- Security analysis of a privacy‐preserving decentralized ciphertext‐policy attribute‐based encryption scheme
- Authors:
- Wang, Minqian
Zhang, Zhenfeng
Chen, Cheng - Other Names:
- Simmhan Yogesh guestEditor.
Ramakrishnan Lavanya guestEditor.
Antoniu Gabriel guestEditor.
Goble Carole guestEditor.
Yu Yong guestEditor.
Mu Yi guestEditor.
Lu Rongxing guestEditor.
Ren Jian guestEditor.
Venticinque Salvatore guestEditor.
Camacho David guestEditor. - Abstract:
- Summary: As it does not require a central authority or the cooperation among multiple authorities, decentralized attribute‐based encryption is an efficient and flexible multi‐authority attribute‐based encryption system. In most existing multi‐authority attribute‐based encryption schemes, a global identifier (GID) is introduced to act as the linchpin to resist collusion attacks. Because GID as well as some sensitive attributes used to apply for secret keys will lead to the compromise of user's privacy, some schemes towards solving these privacy issues have been proposed. Nevertheless, only the privacy of GID was considered in prior works. Recently in ESORICS 2014, Han et al. put forward a privacy‐preserving decentralized ciphertext‐policy attribute‐based encryption scheme in the standard model to address the additive privacy of attributes. In their work, a privacy‐preserving key extract protocol is presented to protect both user's identifier and attributes. In this paper, we point out the security weakness of the scheme of Han et al. We present a collusion attack on their basic decentralized ciphertext‐policy attribute‐based encryption scheme and additionally show that the privacy protection of attributes in their privacy‐preserving key extract protocol cannot be provided. Copyright © 2015 John Wiley & Sons, Ltd.
- Is Part Of:
- Concurrency and computation. Volume 28:Number 4(2016)
- Journal:
- Concurrency and computation
- Issue:
- Volume 28:Number 4(2016)
- Issue Display:
- Volume 28, Issue 4 (2016)
- Year:
- 2016
- Volume:
- 28
- Issue:
- 4
- Issue Sort Value:
- 2016-0028-0004-0000
- Page Start:
- 1237
- Page End:
- 1245
- Publication Date:
- 2015-08-18
- Subjects:
- privacy‐preserving -- decentralized attribute‐based encryption -- security analysis
Parallel processing (Electronic computers) -- Periodicals
Parallel computers -- Periodicals
004.35 - Journal URLs:
- http://onlinelibrary.wiley.com/ ↗
- DOI:
- 10.1002/cpe.3623 ↗
- Languages:
- English
- ISSNs:
- 1532-0626
- Deposit Type:
- Legaldeposit
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library DSC - 3405.622000
British Library DSC - BLDSS-3PM
British Library STI - ELD Digital store - Ingest File:
- 5.xml