Security-Enhanced Function Privacy Attribute-Based Encryption

被引:0
作者
Li, Xinmin [1 ]
Zhang, Leyou [1 ]
Hou, Xuanyang [1 ]
机构
[1] Xidian Univ, Sch Math & Stat, Xian 710071, Peoples R China
来源
FRONTIERS IN CYBER SECURITY, FCS 2023 | 2024年 / 1992卷
基金
中国国家自然科学基金;
关键词
attribute-based encryption; function privacy; fuzzy identity-based encryption;
D O I
10.1007/978-981-99-9331-4_12
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Attribute-based encryption is the extension of identity-based encryption. It associates ciphertext and user private key with attributes to flexibly represent access structure to achieve fine-grained access control. However, at present, most ABE schemes focus on data privacy protection, while ignoring the user's private key, which is an important part of privacy disclosure. Based on the concept of function privacy of IBE, the definition of function privacy attribute-based encryption is given. Additionally, through the analysis of the well known fuzzy identity encryption scheme, we show why the existing work does not support function privacy. To achieve the function privacy, this paper shows how to use "extract-add-combine" to transform the existing work to an security-enhanced scheme. We also present the security proof of the modified scheme.
引用
收藏
页码:176 / 188
页数:13
相关论文
共 18 条
[1]  
Agrawal Shweta., Cryptology ePrint Archive
[2]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[3]  
Boneh D, 2013, LECT NOTES COMPUT SC, V8043, P461, DOI 10.1007/978-3-642-40084-1_26
[4]  
Boneh D, 2013, LECT NOTES COMPUT SC, V8269, P255, DOI 10.1007/978-3-642-42033-7_14
[5]   Function-Private Functional Encryption in the Private-Key Setting [J].
Brakerski, Zvika ;
Segev, Gil .
JOURNAL OF CRYPTOLOGY, 2018, 31 (01) :202-225
[6]   Functional Encryption for Inner Product with Full Function Privacy [J].
Datta, Pratish ;
Dutta, Ratna ;
Mukhopadhyay, Sourav .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I, 2016, 9614 :164-195
[7]  
Goyal V., 2006, Proceedings of the 13th ACM Conference on Computer and Communications Security, P89, DOI DOI 10.1145/1180405.1180418
[8]   A pseudorandom generator from any one-way function [J].
Hästad, J ;
Impagliazzo, R ;
Levin, LA ;
Luby, M .
SIAM JOURNAL ON COMPUTING, 1999, 28 (04) :1364-1396
[9]  
Kaiqing Huang, 2020, 2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA). Proceedings, P563, DOI 10.1109/ICMTMA50254.2020.00126
[10]   Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT [J].
Li, Jiguo ;
Zhang, Yichen ;
Ning, Jianting ;
Huang, Xinyi ;
Poh, Geong Sen ;
Wang, Debang .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (02) :762-773