Unbounded Key-Policy Attribute-Based Encryption With Black-Box Traceability

2020 ◽  
Author(s):  
yunxiu ye ◽  
Zhenfu Cao ◽  
Jiachen Shen

Abstract Attribute-based encryption received widespread attention as soon as it proposes. However, due to its specific characteristics, the attribute-based access control method is not flexible enough in actual operation. In addition, since access authorities are determined according to users' attributes, users sharing the same attributes are difficult to distinguish. Once a malicious user makes illicit gains by their decryption authorities, it is difficult to trace specific users. This paper follows the practical demand to propose a more flexible key-policy attribute-based encryption scheme with black-box traceability. The scheme has a constant number of constant parameters which can be utilized to construct attribute-related parameters flexibly, and the method of traitor tracing in broadcast encryption is introduced to achieve effective malicious user tracing. In addition, the security and feasibility can be proved by the security proofs and performance evaluation in this paper.

2020 ◽  
Author(s):  
Zhen Liu ◽  
Qiong Huang ◽  
Duncan S Wong

Abstract Attribute-based encryption (ABE) is a versatile one-to-many encryption primitive, which enables fine-grained access control over encrypted data. Due to its promising applications in practice, ABE schemes with high efficiency, security and expressivity have been continuously emerging. On the other hand, due to the nature of ABE, a malicious user may abuse its decryption privilege. Therefore, being able to identify such a malicious user is crucial towards the practicality of ABE. Although some specific ABE schemes in the literature enjoys the tracing function, they are only proceeded case by case. Most of the ABE schemes do not support traceability. It is thus meaningful and important to have a generic way of equipping any ABE scheme with traceability. In this work, we partially solve the aforementioned problem. Namely, we propose a way of transforming (non-traceable) ABE schemes satisfying certain requirements to fully collusion-resistant black-box traceable ABE schemes, which adds only $O(\sqrt{\mathcal{K}})$ elements to the ciphertext where ${\mathcal{K}}$ is the number of users in the system. And to demonstrate the practicability of our transformation, we show how to convert a couple of existing non-traceable ABE schemes to support traceability.


2014 ◽  
Vol 2014 ◽  
pp. 1-13 ◽  
Author(s):  
Liaojun Pang ◽  
Jie Yang ◽  
Zhengtao Jiang

With the development of cryptography, the attribute-based encryption (ABE) draws widespread attention of the researchers in recent years. The ABE scheme, which belongs to the public key encryption mechanism, takes attributes as public key and associates them with the ciphertext or the user’s secret key. It is an efficient way to solve open problems in access control scenarios, for example, how to provide data confidentiality and expressive access control at the same time. In this paper, we survey the basic ABE scheme and its two variants: the key-policy ABE (KP-ABE) scheme and the ciphertext-policy ABE (CP-ABE) scheme. We also pay attention to other researches relating to the ABE schemes, including multiauthority, user/attribute revocation, accountability, and proxy reencryption, with an extensive comparison of their functionality and performance. Finally, possible future works and some conclusions are pointed out.


2021 ◽  
Vol 11 (13) ◽  
pp. 5865
Author(s):  
Muhammad Ahsan Gull ◽  
Mikkel Thoegersen ◽  
Stefan Hein Bengtson ◽  
Mostafa Mohammadi ◽  
Lotte N. S. Andreasen Struijk ◽  
...  

Wheelchair mounted upper limb exoskeletons offer an alternative way to support disabled individuals in their activities of daily living (ADL). Key challenges in exoskeleton technology include innovative mechanical design and implementation of a control method that can assure a safe and comfortable interaction between the human upper limb and exoskeleton. In this article, we present a mechanical design of a four degrees of freedom (DOF) wheelchair mounted upper limb exoskeleton. The design takes advantage of non-backdrivable mechanism that can hold the output position without energy consumption and provide assistance to the completely paralyzed users. Moreover, a PD-based trajectory tracking control is implemented to enhance the performance of human exoskeleton system for two different tasks. Preliminary results are provided to show the effectiveness and reliability of using the proposed design for physically disabled people.


Author(s):  
Ou Ruan ◽  
Lixiao Zhang ◽  
Yuanyuan Zhang

AbstractLocation-based services are becoming more and more popular in mobile online social networks (mOSNs) for smart cities, but users’ privacy also has aroused widespread concern, such as locations, friend sets and other private information. At present, many protocols have been proposed, but these protocols are inefficient and ignore some security risks. In the paper, we present a new location-sharing protocol, which solves two issues by using symmetric/asymmetric encryption properly. We adopt the following methods to reduce the communication and computation costs: only setting up one location server; connecting social network server and location server directly instead of through cellular towers; avoiding broadcast encryption. We introduce dummy identities to protect users’ identity privacy, and prevent location server from inferring users’ activity tracks by updating dummy identities in time. The details of security and performance analysis with related protocols show that our protocol enjoys two advantages: (1) it’s more efficient than related protocols, which greatly reduces the computation and communication costs; (2) it satisfies all security goals; however, most previous protocols only meet some security goals.


2019 ◽  
Vol 470 ◽  
pp. 175-188 ◽  
Author(s):  
Jiguo Li ◽  
Qihong Yu ◽  
Yichen Zhang ◽  
Jian Shen

2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Sheng Hu ◽  
Shuanjun Song ◽  
Wenhui Liu

Considering the problem that the process quality state is difficult to analyze and monitor under manufacturing big data, this paper proposed a data cloud model similarity-based quality fluctuation monitoring method in data-driven production process. Firstly, the randomness of state fluctuation is characterized by entropy and hyperentropy features. Then, the cloud pool drive model between quality fluctuation monitoring parameters is built. On this basis, cloud model similarity degree from the perspective of maximum fluctuation border is defined and calculated to realize the process state analysis and monitoring. Finally, the experiment is conducted to verify the adaptability and performance of the cloud model similarity-based quality control approach, and the results indicate that the proposed approach is a feasible and acceptable method to solve the process fluctuation monitoring and quality stability analysis in the production process.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Qinlong Huang ◽  
Yue He ◽  
Wei Yue ◽  
Yixian Yang

Data collaboration in cloud computing is more and more popular nowadays, and proxy deployment schemes are employed to realize cross-cloud data collaboration. However, data security and privacy are the most serious issues that would raise great concerns from users when they adopt cloud systems to handle data collaboration. Different cryptographic techniques are deployed in different cloud service providers, which makes cross-cloud data collaboration to be a deeper challenge. In this paper, we propose an adaptive secure cross-cloud data collaboration scheme with identity-based cryptography (IBC) and proxy re-encryption (PRE) techniques. We first present a secure cross-cloud data collaboration framework, which protects data confidentiality with IBC technique and transfers the collaborated data in an encrypted form by deploying a proxy close to the clouds. We then provide an adaptive conditional PRE protocol with the designed full identity-based broadcast conditional PRE algorithm, which can achieve flexible and conditional data re-encryption among ciphertexts encrypted in identity-based encryption manner and ciphertexts encrypted in identity-based broadcast encryption manner. The extensive analysis and experimental evaluations demonstrate the well security and performance of our scheme, which meets the secure data collaboration requirements in cross-cloud scenarios.


2006 ◽  
Vol 315-316 ◽  
pp. 450-454
Author(s):  
Yan Ling Tian ◽  
Da Wei Zhang ◽  
Cheng Zu Ren ◽  
Bing Yan

In order to implement dynamic compensation for the wheel vibration of surface grinding machine, a micropositioning table with high stiffness and response frequency is designed. The micropositioning table is driven by three piezoelectric actuators with stiffness of 400 N/μm. Three capacitive sensors are utilized to form feedback control and flexure hinges are used to guide the moving part and preload for the piezoelectric actuators. The kinetics of the micropositioning table has been analyzed to understand the relationship of the control voltage and the posture of the moving part. Due to the coupling characteristic of the system, the decoupling control method is introduced to improve the performance of the table. Experimental tests are carried out to investigate the performance of the micropositioning table.


Sign in / Sign up

Export Citation Format

Share Document