Gradual identity exposure using attribute-based encryption

Dijiang Huang, Zhibin Zhou, Zhu Yan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

Many Attribute-Based Encryption (ABE) schemes do not protect receivers' privacy, such that all the attributes to describe the eligible receivers are transmitted in plaintexts. Hidden policy-based ABE schemes have been proposed to protect receivers' privacy by using a construction that requires every user in the system to decrypt the ciphertext using all the attributes they possess, which incurs great computation and communication overhead. To address this issue, in this paper, we propose a new concept - Gradual Identity Exposure (GIE) - to protect data receivers' identity. Our approach is to reveal the receivers' information gradually by allowing ciphertext recipients for decrypting the message using their possessed attributes one-by-one (but not all). If the receiver does not possess one attribute in this procedure, the rest of attributes are still hidden. Compared to hidden-policy based solutions, GIE provides significant performance improvement in terms of reducing both computation and communication overhead. We also present a theoretical framework to model the GIE with several new proposed concepts.

Original languageEnglish (US)
Title of host publicationProceedings - SocialCom 2010
Subtitle of host publication2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust
Pages881-888
Number of pages8
DOIs
StatePublished - Nov 29 2010
Event2nd IEEE International Conference on Social Computing, SocialCom 2010, 2nd IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010 - Minneapolis, MN, United States
Duration: Aug 20 2010Aug 22 2010

Publication series

NameProceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust

Other

Other2nd IEEE International Conference on Social Computing, SocialCom 2010, 2nd IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010
CountryUnited States
CityMinneapolis, MN
Period8/20/108/22/10

Keywords

  • Identity
  • Privacy

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems

Fingerprint Dive into the research topics of 'Gradual identity exposure using attribute-based encryption'. Together they form a unique fingerprint.

  • Cite this

    Huang, D., Zhou, Z., & Yan, Z. (2010). Gradual identity exposure using attribute-based encryption. In Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust (pp. 881-888). [5591436] (Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust). https://doi.org/10.1109/SocialCom.2010.131