2018
DOI: 10.3390/sym10100482
|View full text |Cite
|
Sign up to set email alerts
|

Practical, Provably Secure, and Black-Box Traceable CP-ABE for Cryptographic Cloud Storage

Abstract: Cryptographic cloud storage (CCS) is a secure architecture built in the upper layer of a public cloud infrastructure. In the CCS system, a user can define and manage the access control of the data by himself without the help of cloud storage service provider. The ciphertext-policy attribute-based encryption (CP-ABE) is considered as the critical technology to implement such access control. However, there still exists a large security obstacle to the implementation of CP-ABE in CCS. That is, how to identify the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 39 publications
(72 reference statements)
0
4
0
Order By: Relevance
“…We note here that monotonicity of decryption ability is not guaranteed in [33]. [34][35] proposed a CP-ABE scheme with anti-collusion black-box traceability. Our work adds white-box traceability to the CP-ABE key delegation and supports any monotonic access structure.…”
Section: Related Workmentioning
confidence: 98%
“…We note here that monotonicity of decryption ability is not guaranteed in [33]. [34][35] proposed a CP-ABE scheme with anti-collusion black-box traceability. Our work adds white-box traceability to the CP-ABE key delegation and supports any monotonic access structure.…”
Section: Related Workmentioning
confidence: 98%
“…Most black-box-traceable schemes such as [10,[16][17][18][19]] make use of the tracing algorithm Trace D , while [20][21][22] employ other approaches for tracing. However, these tracing mechanisms in all existing traceable CP-ABE schemes follow a similar assumption that may be unreasonable.…”
Section: How To Frustrate Tracingmentioning
confidence: 99%
“…Similar to BE, attribute based encryption (ABE) [5,33,34] can also encrypt a message to a set of users. Therefore, ABE can be used in similar modern applications such as File Sharing systems and Cloud Storage systems.…”
Section: Related Workmentioning
confidence: 99%