JISE


  [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24]


Journal of Information Science and Engineering, Vol. 27 No. 1, pp. 181-195


Attribute-Based Traitor Tracing


YONG-TAO WANG1, KE-FEI CHEN1,2 AND JIAN-HONG CHEN1,3
1Department of Computer Science and Engineering 
Shanghai Jiao Tong University 
Shanghai 200240, P.R. China 
2National Laboratory of Modern Communications 
Chengdu 610041, P.R. China 
3Huaiyin Institute of Technology 
Huaian 223003, P.R. China


    In this paper, we focus on traitor tracing scheme in attribute-based encryption (ABE) scenarios. A well-known concern in the setting of attribute-based encryption is that a user (or set of colluding users) can create a new key (or decryption device) by using his legal one and distribute it for malicious use. To mitigate this problem, we introduce the notion of attribute-based traitor tracing (ABTT). We formalize the definitions and security notions for attribute-based traitor tracing scheme, and then present a construction of ABTT. Our scheme makes use of the identity-based traitor tracing technology proposed by Abdalla et al., and is based on the second construction of Sahai-Waters’ attribute-based encryption schemes, but in the asymmetric bilinear setting. Our scheme is shown to be secure in the standard model under some reasonable assumptions. To the best of our knowledge, this is the first ABTT scheme up to now.


Keywords: attribute-based encryption, traitor tracing, access rights, collusion, decryption device

  Retrieve PDF document (JISE_201101_12.pdf)