ML p(r)ior | User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption -- Full Version

User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption -- Full Version

2016-02-03
1602.01261 | cs.CR
Recent trend towards cloud computing paradigm, smart devices and 4G wireless technologies has enabled seamless data sharing among users. Cloud computing environment is distributed and untrusted, hence data owners have to encrypt their data to enforce data confidentiality. The data confidentiality in a distributed environment can be achieved by using attribute-based encryption technique. Decentralized attribute-based encryption technique is a variant of multiple authority based attribute-based encryption whereby any attribute authority can independently join and leave the system without collaborating with the existing attribute authorities. In this paper, we propose a privacy-preserving decentralized key-policy attribute-based encryption scheme. The scheme preserves the user privacy when users interact with multiple authorities to obtain decryption keys while mitigating the well-known user collusion security vulnerability. We showed that our scheme relies on decisional bilinear Diffie-Hellman standard complexity assumption in contrast to the previous nonstandard complexity assumptions such as $q-$decisional Diffie-Hellman inversion.
PDF

Highlights - Most important sentences from the article

Login to like/save this paper, take notes and configure your recommendations

Related Articles

2019-01-29

Performing searches over encrypted data is a very current and active area. Several efficient solutio… show more
PDF

Highlights - Most important sentences from the article

2019-04-25

In this paper, we propose a multi-authority attribute-based signcryption scheme with efficient revoc… show more
PDF

Highlights - Most important sentences from the article

2018-12-26
1812.10450 | cs.CR

The possibility of use the keys preliminary distribution KDP-scheme for mandatory access control rea… show more
PDF

Highlights - Most important sentences from the article

2018-12-26
1812.10334 | cs.CR

In article the modification of the Blom's keys preliminary distribution scheme, considering the dire… show more
PDF

Highlights - Most important sentences from the article

2018-10-13

Ciphertext-policy hierarchical attribute-based encryption (CP-HABE) is a promising cryptographic pri… show more
PDF

Highlights - Most important sentences from the article

2017-07-19

The social demand for email end-to-end encryption is barely supported by mainstream service provider… show more
PDF

Highlights - Most important sentences from the article

2018-11-19

An anonymous Single Sign-On (ASSO) scheme allows users to access multiple services anonymously using… show more
PDF

Highlights - Most important sentences from the article

2019-04-25

Current systems used by medical institutions for the management and transfer of Electronic Medical R… show more
PDF

Highlights - Most important sentences from the article

2019-04-02
1904.01203 | cs.CR

Cloud computing can provide a flexible way to effectively share data among multiple users since it c… show more
PDF

Highlights - Most important sentences from the article

2019-02-09

Cryptocurrencies, led by bitcoin launched in 2009, have obtained wide attention due to the emerging … show more
PDF

Highlights - Most important sentences from the article

2019-03-17
1903.07009 | cs.CR

Attribute-based access control makes access control decisions based on the assigned attributes of su… show more
PDF

Highlights - Most important sentences from the article

2019-03-28
1904.00880 | cs.CR

The management of sensitive data, including identity management (IDM), is an important problem in cl… show more
PDF

Highlights - Most important sentences from the article

2019-01-02

Group signatures allow users of a group to sign messages anonymously in the name of the group, while… show more
PDF

Highlights - Most important sentences from the article

2018-12-03
1812.00599 | cs.CR

With the rapid development of cloud computing, the privacy security incidents occur frequently, espe… show more
PDF

Highlights - Most important sentences from the article

2018-07-31

In the near future, a technological revolution will involve our cities, where a variety of smart ser… show more
PDF

Highlights - Most important sentences from the article

2018-11-08

In recent years, cloud storage technology has been widely used in many fields such as education, bus… show more
PDF

Highlights - Most important sentences from the article