Proposing to Increase Privacy & Security in PPMA-ABE

Authors

  • Mr. M. Chinnasamy  Computer Science & Application, PGP ollege of Arts & Science, Namakkal, Tamilnadu, India
  • S. Gandhimathi  Asst. Prof & HOD, Computer Science & Application, PGP college of Arts & Science, Namakkal, Tamilnadu, India
  • Dr. M. Sivasakthi  Asst.Prof, Computer Science & Application, Loyola College, Chennai-34, Tamilnadu, India

Keywords:

Proposing to Increase Privacy & Security in PPMA-ABE

Abstract

ABSTRACT In previous privacy-preserving multiauthority attribute-based encryption (PPMA-ABE) schemes, a user can acquire secret keys from multiple authorities with them knowing his/her attributes and furthermore, a central authority is required. Notably, a user’s identity information can be extracted from his/her some sensitive attributes. Hence, existing PPMA-ABE schemes cannot fully protect users’ privacy as multiple authorities can collaborate to identify a user by collecting and analyzing his attributes. Moreover, ciphertext-policy ABE (CP-ABE) is a more efficient public-key encryption, where the encryptor can select flexible access structures to encrypt messages. Therefore, a challenging and important work is to construct a PPMA-ABE scheme where there is no necessity of having the central authority and furthermore, both the identifiers and the attributes can be protected to be known by the authorities. In this paper, a privacy-preserving decentralized CP-ABE (PPDCP-ABE) is proposed to reduce the trust on the central authority and protect users’ privacy. In our PPDCP-ABE scheme, each authority can work independently without any collaboration to initial the system and issue secret keys to users. Furthermore, a user can obtain secret keys from multiple authorities without them knowing anything about his global identifier and attributes.

References

  1. Au.M.H,  Han.J, Mu.J, and Susilo.W, ZhoU.J, (2014) “PPDCPABE: Privacy-preserving decentralized ciphertext-policy attribute-based encryption,” in Computer Security (Lecture Notes in Computer Science), vol. 8713. Cham, Switzerland: Springer-Verlag,  pp. 73–90.
  2. Bethencourt.J, Sahai.A, and Waters.B, (2007) “Ciphertext-policy attribute based encryption,” in Proc. IEEE Symp. SP,  pp. 321–334.
  3. Bichsel.P, Camenisch.J, GroB.T, and Shoup.V, (2009) “Anonymous credentials on a standard Java Card,” in Proc. ACM Conf. CCS, pp. 600–610.
  4. Chase.M and ChowS.S, (2006) “Improving privacy and security in multi authority attribute-based encryption,” in Proc. 16th ACM Conf. CCS, 2009, pp. 121–130.
  5. Cheung.L  and Newport.C , (2007) “Provably secure ciphertext policy ABE,” in Proc. 14th ACM Conf. CCS, pp. 456–465.
  6. Goyal.V, Pandey.O, Sahai.A, and Waters.B, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. 13th ACM Conf. CCS, pp. 89–98.
  7. Lewko.A and Waters.B, (2011) “Decentralizing attribute-based encryption,” in Advances in Cryptology (Lecture Notes in Computer Science), vol. 6632. Heidelberg, Germany: Springer-Verlag, pp. 568–588.
  8. Ostrovsky.R, Sahai.A, and Waters.B, (2007) “Attribute-based encryption with non-monotonic access structures,” in Proc. 14th ACM Conf. CCS,  pp. 195–203.
  9. Sahai.A and Waters.B, (2005) “Fuzzy identity-based encryption,” in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3494.Heidelberg, Germany: Springer-Verlag, , pp. 457–473.

Downloads

Published

2017-06-30

Issue

Section

Research Articles

How to Cite

[1]
Mr. M. Chinnasamy, S. Gandhimathi, Dr. M. Sivasakthi, " Proposing to Increase Privacy & Security in PPMA-ABE, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 3, pp.73-84, May-June-2017.