An attribute based encryption scheme (ABE) is a cryptographic primitive in which every user is identified by a set of attributes, and some function of these attributes is used to determine the ability to decrypt each ciphertext. Chase proposed the first multi authority ABE scheme in TCC 2007 as an answer to an open problem presented by Sahai and Waters in EUROCRYPT 2005. However, her scheme needs a fully trusted central authority which can decrypt every ciphertext in the system. This central authority would endanger the whole system if it's corrupted.
This paper presents a threshold multi authority fuzzy identity based encryption(MA-FIBE) scheme without a central authority for the first time. An encrypter can encrypt a message such that a user could only decrypt if he has at least d k of the given attributes about the message for at least t + 1, t ≤ n /2 honest authorities of all the n attribute authorities in the proposed scheme. The security proof is based on the secrecy of the underlying joint random secret sharing protocol and joint zero secret sharing protocol and the standard decisional bilinear Diffie-Hellman assumption. The proposed MA-FIBE could be extended to the threshold multi authority attribute based encryption (MA-ABE) scheme and be further extended to a proactive MA-ABE scheme.
[1]
Hugo Krawczyk,et al.
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
,
1999,
Journal of Cryptology.
[2]
Melissa Chase,et al.
Multi-authority Attribute Based Encryption
,
2007,
TCC.
[3]
Ling Cheung,et al.
Provably secure ciphertext policy ABE
,
2007,
CCS '07.
[4]
H. Imai,et al.
Efficient and secure multiparty generation of digital signatures based on discrete logarithms
,
1993
.
[5]
Brent Waters,et al.
Ciphertext-Policy Attribute-Based Encryption
,
2007,
2007 IEEE Symposium on Security and Privacy (SP '07).
[6]
Adi Shamir,et al.
Identity-Based Cryptosystems and Signature Schemes
,
1984,
CRYPTO.
[7]
Brent Waters,et al.
Secure attribute-based systems
,
2006,
CCS '06.
[8]
Hugo Krawczyk,et al.
Robust Threshold DSS Signatures
,
1996,
Inf. Comput..
[9]
Rafail Ostrovsky,et al.
Attribute-based encryption with non-monotonic access structures
,
2007,
CCS '07.
[10]
Brent Waters,et al.
Fuzzy Identity-Based Encryption
,
2005,
EUROCRYPT.
[11]
Brent Waters,et al.
Attribute-based encryption for fine-grained access control of encrypted data
,
2006,
CCS '06.