Outsourced Multi-authority ABE with White-Box Traceability for Cloud-IoT

Some unsettled security issues, such as illegal data access and secret key leakage, dramatically impact the popularity of cloud-assisted Internet of Things (Cloud-IoT). The attribute-based encryption (ABE) achieves data confidentiality and one-to-many data sharing simultaneously, yet it consumes too much to decrypt. In this paper, a multi-authority ABE scheme with verifiable outsourced decryption and white-box traceability is proposed, which greatly lightens the burden on IoT devices. Moreover fully hidden policy and user traceability are realized and replayable chosen ciphertext security is proved.

[1]  Sherman S. M. Chow,et al.  Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.

[2]  Jiguo Yu,et al.  Edge Computing Security: State of the Art and Challenges , 2019, Proceedings of the IEEE.

[3]  Kai Zhang,et al.  Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability , 2017, Science China Information Sciences.

[4]  Dan Boneh,et al.  Short Signatures Without Random Oracles , 2004, EUROCRYPT.

[5]  Jian Shen,et al.  Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length , 2017, Secur. Commun. Networks.

[6]  Jun Zhang,et al.  High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space , 2018, Science China Information Sciences.

[7]  Jiguo Yu,et al.  BC-SABE: Blockchain-Aided Searchable Attribute-Based Encryption for Cloud-IoT , 2020, IEEE Internet of Things Journal.

[8]  Xiaofeng Liao,et al.  Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme , 2013, IEEE Journal on Selected Areas in Communications.

[9]  Hongbo Zhu,et al.  Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud , 2018, Wirel. Commun. Mob. Comput..

[10]  Matthew Green,et al.  Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.

[11]  Rainer Steinwandt,et al.  Multi-authority attribute-based encryption with honest-but-curious central authority , 2012, Int. J. Comput. Math..

[12]  Abderrazak Jemai,et al.  PAbAC: A Privacy Preserving Attribute based Framework for Fine Grained Access Control in Clouds , 2016, SECRYPT.

[13]  Tao Xiang,et al.  Secure and Efficient Data Collection and Storage of IoT in Smart Ocean , 2020, IEEE Internet of Things Journal.

[14]  Allison Bishop,et al.  Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..

[15]  Arwa Alrawais,et al.  R²PEDS: A Recoverable and Revocable Privacy-Preserving Edge Data Sharing Scheme , 2020, IEEE Internet of Things Journal.

[16]  Hugo Krawczyk,et al.  Relaxing Chosen-Ciphertext Security , 2003, CRYPTO.

[17]  M. Laurent-Maknavicius,et al.  PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT , 2018, Comput. Networks.

[18]  Jiguo Yu,et al.  LH-ABSC: A Lightweight Hybrid Attribute-Based Signcryption Scheme for Cloud-Fog-Assisted IoT , 2020, IEEE Internet of Things Journal.

[19]  Ian Miers,et al.  Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.

[20]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[21]  Jie Cui,et al.  Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage , 2016, Soft Computing.

[22]  Xiaoyun Wang,et al.  How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.

[23]  Reihaneh Safavi-Naini,et al.  Attribute-based encryption without key cloning , 2012, Int. J. Appl. Cryptogr..

[24]  Hong Li,et al.  Coin Hopping Attack in Blockchain-Based IoT , 2019, IEEE Internet of Things Journal.

[25]  Zhipeng Cai,et al.  Privacy-Preserved Data Sharing Towards Multiple Parties in Industrial IoTs , 2020, IEEE Journal on Selected Areas in Communications.