Defending against key abuse attacks in KP-ABE enabled broadcast systems

Shucheng Yu, Kui Ren, Wenjing Lou, Jin Li

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

66 Scopus citations

Abstract

Key-Policy Attribute-Based Encryption (KP-ABE) is a promising cryptographic primitive which enables fine-grained access control over sensitive data. However, key abuse attacks in KP-ABE may impede its wide application especially in copyright-sensitive systems. To defend against this kind of attacks, this paper proposes a novel KP-ABE scheme which is able to disclose any illegal key distributor's ID when key abuse is detected. In our scheme, each bit of user ID is defined as an attribute and the user secret key is associated with his unique ID. The tracing algorithm fulfills its task by tricking the pirate device into decrypting the ciphertext associated with the corresponding bits of his ID. Our proposed scheme has the salient property of black box tracing, i.e., it traces back to the illegal key distributor's ID only by observing the pirate device's outputs on certain inputs. In addition, it does not require the pirate device's secret keys to be well-formed as compared to some previous work. Our proposed scheme is provably secure under the De-cisional Bilinear Diffie-Hellman (DBDH) assumption and the Decisional Linear (DL) assumption.

Original languageEnglish
Title of host publicationSecurity and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Revised Selected Papers
Pages311-329
Number of pages19
DOIs
StatePublished - 2009
Event5th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2009 - Athens, Greece
Duration: 14 Sep 200918 Sep 2009

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
Volume19 LNICST
ISSN (Print)1867-8211

Conference

Conference5th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2009
Country/TerritoryGreece
CityAthens
Period14/09/0918/09/09

Fingerprint

Dive into the research topics of 'Defending against key abuse attacks in KP-ABE enabled broadcast systems'. Together they form a unique fingerprint.

Cite this