Download PDFOpen PDF in browser

Registered Key-Policy Attribute-Based Encryption

10 pagesPublished: August 21, 2025

Abstract

Attributed-based encryption (ABE) enables fine-grained access control over encrypted data. However, ABE requires a single trusted authority to issue decryption keys, which makes ABE have a key-escrow problem. If an adversary breaks through the system, then the adversary can decrypt all ciphertext encrypted through the system. In this work, we generalize the notion of registration-based encryption (RBE) to key-policy attributed-based encryption (KP-ABE). Through the introduction of RBE, users can autonomously generate their own keys, thereby effectively resolving the key-escrow problem of KP-ABE.

Keyphrases: attribute based encryption, key escrow problem, predicate encoding, registration based encryption

In: Akira Yamada, Huy Kang Kim, Yujue Wang and Tung-Tso Tsai (editors). Proceedings of the 20th Asia Joint Conference on Information Security, vol 106, pages 155-164.

BibTeX entry
@inproceedings{AsiaJCIS2025:Registered_Key_Policy_Attribute,
  author    = {Shih-Pei Kao and Yi-Fan Tseng and Tien-Lin Tsai and Yi-Jiin Lu and Jheng-Jia Huang and Guan-Yu Chen and Wei-Hsueh Wang},
  title     = {Registered Key-Policy Attribute-Based Encryption},
  booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
  editor    = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
  series    = {EPiC Series in Computing},
  volume    = {106},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/LzGd},
  doi       = {10.29007/tjfx},
  pages     = {155-164},
  year      = {2025}}
Download PDFOpen PDF in browser