Download PDFOpen PDF in browserRegistered Key-Policy Attribute-Based Encryption10 pages•Published: August 21, 2025AbstractAttributed-based encryption (ABE) enables fine-grained access control over encrypted data. However, ABE requires a single trusted authority to issue decryption keys, which makes ABE have a key-escrow problem. If an adversary breaks through the system, then the adversary can decrypt all ciphertext encrypted through the system. In this work, we generalize the notion of registration-based encryption (RBE) to key-policy attributed-based encryption (KP-ABE). Through the introduction of RBE, users can autonomously generate their own keys, thereby effectively resolving the key-escrow problem of KP-ABE.Keyphrases: attribute based encryption, key escrow problem, predicate encoding, registration based encryption In: Akira Yamada, Huy Kang Kim, Yujue Wang and Tung-Tso Tsai (editors). Proceedings of the 20th Asia Joint Conference on Information Security, vol 106, pages 155-164.
|

