Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Removing escrow from ciphertext policy attribute-based encryption

Full metadata record
DC Field Value Language
dc.contributor.authorHur, Junbeom-
dc.contributor.authorKoo, Dongyoung-
dc.contributor.authorHwang, Seong Oun-
dc.contributor.authorKang, Kyungtae-
dc.date.accessioned2021-06-23T03:42:12Z-
dc.date.available2021-06-23T03:42:12Z-
dc.date.issued2013-05-
dc.identifier.issn0898-1221-
dc.identifier.issn1873-7668-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/28373-
dc.description.abstractAttribute-based encryption (ABE) is a promising cryptographic primitive for fine-grained access control of distributed data. In ciphertext policy attribute-based encryption (CP-ABE), each user is associated with a set of attributes and data are encrypted with access policies on attributes. A user is able to decrypt a ciphertext if and only if his attributes satisfy the access policy embedded in the ciphertext. However, key escrow is inherent in ABE systems. A curious key generation center in that construction has the power to decrypt every ciphertext. We found that most of the existing ABE schemes depending on a single key authority suffer from the key escrow problem. In this study, we propose a novel CP-ABE key issuing architecture that solves the key escrow problem. The proposed scheme separates the power of issuing user keys into two parties: the key generation center and the attribute authority. In the proposed construction, the key generation center and the attribute authority issue different parts of secret key components to users through a secure two-party computation protocol such that none of them can determine the whole set of keys of users individually. We demonstrate how the proposed key issuing protocol can be applied in the existing CP-ABE scheme and resolve the key escrow problem. (C) 2012 Elsevier Ltd. All rights reserved.-
dc.format.extent8-
dc.language영어-
dc.language.isoENG-
dc.publisherPERGAMON-ELSEVIER SCIENCE LTD-
dc.titleRemoving escrow from ciphertext policy attribute-based encryption-
dc.typeArticle-
dc.publisher.location영국-
dc.identifier.doi10.1016/j.camwa.2012.02.005-
dc.identifier.scopusid2-s2.0-84877728131-
dc.identifier.wosid000320291500008-
dc.identifier.bibliographicCitationCOMPUTERS & MATHEMATICS WITH APPLICATIONS, v.65, no.9, pp 1310 - 1317-
dc.citation.titleCOMPUTERS & MATHEMATICS WITH APPLICATIONS-
dc.citation.volume65-
dc.citation.number9-
dc.citation.startPage1310-
dc.citation.endPage1317-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClasssci-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaMathematics-
dc.relation.journalWebOfScienceCategoryMathematics, Applied-
dc.subject.keywordPlusAccess control-
dc.subject.keywordPlusData privacy-
dc.subject.keywordPlusAttribute authority-
dc.subject.keywordPlusAttribute-based encryptions-
dc.subject.keywordPlusCiphertext policies-
dc.subject.keywordPlusCryptographic primitives-
dc.subject.keywordPlusDistributed data-
dc.subject.keywordPlusKey generation centers-
dc.subject.keywordPlusRemoving escrow-
dc.subject.keywordPlusSecure two-party computations-
dc.subject.keywordAuthorCiphertext policy-
dc.subject.keywordAuthorAttribute based encryption-
dc.subject.keywordAuthorRemoving escrow-
dc.subject.keywordAuthorPrivacy-
dc.subject.keywordAuthorAccess control-
dc.identifier.urlhttps://www.sciencedirect.com/science/article/pii/S0898122112001198?via%3Dihub-
Files in This Item
Go to Link
Appears in
Collections
COLLEGE OF COMPUTING > DEPARTMENT OF ARTIFICIAL INTELLIGENCE > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kang, Kyung tae photo

Kang, Kyung tae
ERICA 소프트웨어융합대학 (DEPARTMENT OF ARTIFICIAL INTELLIGENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE