Previous [ 1] [ 2] [ 3] [ 4] [ 5] [ 6] [ 7] [ 8] [ 9] [ 10] [ 11] [ 12] [ 13] [ 14] [ 15] [ 16] [ 17] [ 18] [ 19] [ 20] [ 21] [ 22] [ 23] [ 24] [ 25]

@

Journal of Information Science and Engineering, Vol. 27 No. 1, pp. 181-195 (January 2011)

Attribute-Based Traitor Tracing*

YONG-TAO WANG1, KE-FEI CHEN1,2 AND JIAN-HONG CHEN1,3
1Department of Computer Science and Engineering
Shanghai Jiao Tong University
Shanghai 200240, P.R. China
2National Laboratory of Modern Communications
Chengdu 610041, P.R. China
3Huaiyin Institute of Technology
Huaian 223003, P.R. China

In this paper, we focus on traitor tracing scheme in attribute-based encryption (ABE) scenarios. A well-known concern in the setting of attribute-based encryption is that a user (or set of colluding users) can create a new key (or decryption device) by using his legal one and distribute it for malicious use. To mitigate this problem, we introduce the notion of attribute-based traitor tracing (ABTT). We formalize the definitions and security notions for attribute-based traitor tracing scheme, and then present a construction of ABTT. Our scheme makes use of the identity-based traitor tracing technology proposed by Abdalla et al., and is based on the second construction of Sahai-Waters attribute-based encryption schemes, but in the asymmetric bilinear setting. Our scheme is shown to be secure in the standard model under some reasonable assumptions. To the best of our knowledge, this is the first ABTT scheme up to now.

Keywords: attribute-based encryption, traitor tracing, access rights, collusion, decryption device

Full Text () Retrieve PDF document (201101_12.pdf)

Received March 24, 2009; accepted December 21, 2009.
Communicated by Wen-Guey Tzeng.
* This work was supported by the National Natural Science Foundation of China (No. 60970111), the National Basic Research Program (973) of China (No. 2007CB311201) and the Foundation of NLMC (9140C1103020803).