Gradual identity exposure using attribute-based encryption

Dijiang Huang, Zhibin Zhou, Zhu Yan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Many Attribute-Based Encryption (ABE) schemes do not protect receivers' privacy, such that all the attributes to describe the eligible receivers are transmitted in plaintexts. Hidden policy-based ABE schemes have been proposed to protect receivers' privacy by using a construction that requires every user in the system to decrypt the ciphertext using all the attributes they possess, which incurs great computation and communication overhead. To address this issue, in this paper, we propose a new concept - Gradual Identity Exposure (GIE) - to protect data receivers' identity. Our approach is to reveal the receivers' information gradually by allowing ciphertext recipients for decrypting the message using their possessed attributes one-by-one (but not all). If the receiver does not possess one attribute in this procedure, the rest of attributes are still hidden. Compared to hidden-policy based solutions, GIE provides significant performance improvement in terms of reducing both computation and communication overhead. We also present a theoretical framework to model the GIE with several new proposed concepts.

Original languageEnglish (US)
Title of host publicationProceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust
Pages881-888
Number of pages8
DOIs
StatePublished - 2010
Event2nd IEEE International Conference on Social Computing, SocialCom 2010, 2nd IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010 - Minneapolis, MN, United States
Duration: Aug 20 2010Aug 22 2010

Other

Other2nd IEEE International Conference on Social Computing, SocialCom 2010, 2nd IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010
CountryUnited States
CityMinneapolis, MN
Period8/20/108/22/10

Fingerprint

Cryptography
Communication

Keywords

  • Identity
  • Privacy

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems

Cite this

Huang, D., Zhou, Z., & Yan, Z. (2010). Gradual identity exposure using attribute-based encryption. In Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust (pp. 881-888). [5591436] https://doi.org/10.1109/SocialCom.2010.131

Gradual identity exposure using attribute-based encryption. / Huang, Dijiang; Zhou, Zhibin; Yan, Zhu.

Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust. 2010. p. 881-888 5591436.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Huang, D, Zhou, Z & Yan, Z 2010, Gradual identity exposure using attribute-based encryption. in Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust., 5591436, pp. 881-888, 2nd IEEE International Conference on Social Computing, SocialCom 2010, 2nd IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010, Minneapolis, MN, United States, 8/20/10. https://doi.org/10.1109/SocialCom.2010.131
Huang D, Zhou Z, Yan Z. Gradual identity exposure using attribute-based encryption. In Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust. 2010. p. 881-888. 5591436 https://doi.org/10.1109/SocialCom.2010.131
Huang, Dijiang ; Zhou, Zhibin ; Yan, Zhu. / Gradual identity exposure using attribute-based encryption. Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust. 2010. pp. 881-888
@inproceedings{f4bce8e3ba0044fd89a5d9c7dfb7d143,
title = "Gradual identity exposure using attribute-based encryption",
abstract = "Many Attribute-Based Encryption (ABE) schemes do not protect receivers' privacy, such that all the attributes to describe the eligible receivers are transmitted in plaintexts. Hidden policy-based ABE schemes have been proposed to protect receivers' privacy by using a construction that requires every user in the system to decrypt the ciphertext using all the attributes they possess, which incurs great computation and communication overhead. To address this issue, in this paper, we propose a new concept - Gradual Identity Exposure (GIE) - to protect data receivers' identity. Our approach is to reveal the receivers' information gradually by allowing ciphertext recipients for decrypting the message using their possessed attributes one-by-one (but not all). If the receiver does not possess one attribute in this procedure, the rest of attributes are still hidden. Compared to hidden-policy based solutions, GIE provides significant performance improvement in terms of reducing both computation and communication overhead. We also present a theoretical framework to model the GIE with several new proposed concepts.",
keywords = "Identity, Privacy",
author = "Dijiang Huang and Zhibin Zhou and Zhu Yan",
year = "2010",
doi = "10.1109/SocialCom.2010.131",
language = "English (US)",
isbn = "9780769542119",
pages = "881--888",
booktitle = "Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust",

}

TY - GEN

T1 - Gradual identity exposure using attribute-based encryption

AU - Huang, Dijiang

AU - Zhou, Zhibin

AU - Yan, Zhu

PY - 2010

Y1 - 2010

N2 - Many Attribute-Based Encryption (ABE) schemes do not protect receivers' privacy, such that all the attributes to describe the eligible receivers are transmitted in plaintexts. Hidden policy-based ABE schemes have been proposed to protect receivers' privacy by using a construction that requires every user in the system to decrypt the ciphertext using all the attributes they possess, which incurs great computation and communication overhead. To address this issue, in this paper, we propose a new concept - Gradual Identity Exposure (GIE) - to protect data receivers' identity. Our approach is to reveal the receivers' information gradually by allowing ciphertext recipients for decrypting the message using their possessed attributes one-by-one (but not all). If the receiver does not possess one attribute in this procedure, the rest of attributes are still hidden. Compared to hidden-policy based solutions, GIE provides significant performance improvement in terms of reducing both computation and communication overhead. We also present a theoretical framework to model the GIE with several new proposed concepts.

AB - Many Attribute-Based Encryption (ABE) schemes do not protect receivers' privacy, such that all the attributes to describe the eligible receivers are transmitted in plaintexts. Hidden policy-based ABE schemes have been proposed to protect receivers' privacy by using a construction that requires every user in the system to decrypt the ciphertext using all the attributes they possess, which incurs great computation and communication overhead. To address this issue, in this paper, we propose a new concept - Gradual Identity Exposure (GIE) - to protect data receivers' identity. Our approach is to reveal the receivers' information gradually by allowing ciphertext recipients for decrypting the message using their possessed attributes one-by-one (but not all). If the receiver does not possess one attribute in this procedure, the rest of attributes are still hidden. Compared to hidden-policy based solutions, GIE provides significant performance improvement in terms of reducing both computation and communication overhead. We also present a theoretical framework to model the GIE with several new proposed concepts.

KW - Identity

KW - Privacy

UR - http://www.scopus.com/inward/record.url?scp=78649232755&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=78649232755&partnerID=8YFLogxK

U2 - 10.1109/SocialCom.2010.131

DO - 10.1109/SocialCom.2010.131

M3 - Conference contribution

AN - SCOPUS:78649232755

SN - 9780769542119

SP - 881

EP - 888

BT - Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust

ER -