Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay

@inproceedings{Liu2013BlackboxTC,
  title={Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay},
  author={Zhen Liu and Zhenfu Cao and Duncan S. Wong},
  booktitle={ACM Conference on Computer and Communications Security},
  year={2013}
}
In the context of Ciphertext-Policy Attribute-Based Encryption (CP-ABE), if a decryption device associated with an attribute set S_D appears on eBay, and is alleged to be able to decrypt any ciphertexts with policies satisfied by S_D, no one including the CP-ABE authorities can identify the malicious user(s) who build such a decryption device using their key(s). This has been known as a major practicality concern in CP-ABE applications, for example, providing fine-grained access control on… CONTINUE READING
Highly Cited
This paper has 60 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 32 extracted citations

Anonymous Attribute-Based Encryption with Large Universe and Threshold Access Structures

22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC) • 2017
View 1 Excerpt

Blockchain with Accountable CP-ABE: How to Effectively Protect the Electronic Documents

2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS) • 2017
View 1 Excerpt

60 Citations

01020'14'15'16'17'18'19
Citations per Year
Semantic Scholar estimates that this publication has 60 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-8 of 8 references

Building efficient fully collusion-resilient traitor tracing and revocation schemes

ACM Conference on Computer and Communications Security • 2009
View 10 Excerpts
Highly Influenced

Fuzzy Identity Based Encryption

IACR Cryptology ePrint Archive • 2004
View 17 Excerpts
Highly Influenced

A fully collusion resistant broadcast, trace, and revoke system

ACM Conference on Computer and Communications Security • 2006
View 10 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…