Security analysis for a ciphertext-policy attribute-based encryption scheme

被引:0
作者
Zeng, Fugeng [1 ,2 ]
Xu, Chunxiang [1 ]
Zhang, Xinpeng [1 ]
机构
[1] School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu
[2] School of Science and Engineering, Qiongzhou University, Hainan
来源
Advances in Information Sciences and Service Sciences | 2012年 / 4卷 / 12期
关键词
CP-ABE; Generic bilinear group model; Provable secure;
D O I
10.4156/AISS.vol4.issue12.23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the ciphertext-policy ABE (CP-ABE) schemes, attributes are associated with secret keys and access structures are associated with ciphertexts. The access structures are described with the attributes and therefore the concept of CP-ABE is closely related to Role-Based Access Control. Because it requires both of the encryptor and the key generalization center meeting the construction, it will be more difficult to design. Ibraimi et al.[7] allegedly proposed an efficient and provable secure CP-ABE schemes. They require that the simulator can not send back the private keys of attributes which overlap with challenging access attributes. We point out their fault of security proof and their requirement is a small probability event and it is unreasonable to reduce to standard DBDH assumption. However, we give a proof in the generic bilinear group model, which is weaker than DBDH assumption.
引用
收藏
页码:201 / 207
页数:6
相关论文
共 15 条
[1]  
Sahai A., Waters B., Fuzzy Identity-based Encryption, 3494, pp. 457-473, (2005)
[2]  
Goyal V., Pandey O., Sahai A., Waters B., Attribute-based Encryption For Fine Grained Access Control of Encrypted Data, pp. 89-98
[3]  
Bethencourt J., Sahai A., Waters B., Ciphertext Policy Attribute Based Encryption, IEEE Symposium On Security and Privacy, pp. 321-334
[4]  
Cheung L., Newport C., Provably Secure Ciphertext Policy ABE, pp. 456-465
[5]  
Goyal V., Jain A., Pandey O., Sahai A., Bounded Ciphertext Policy Attribute Based Encryption, 5126, pp. 579-591, (2008)
[6]  
Liang X., Cao Z., Lin H., Xing D., Provably secure and efficient bounded ciphertext policy attribute based encryption, Proceedings of the 4th International Symposium On Information, Computer and Communications Security, pp. 343-352, (2009)
[7]  
Ibraimi L., Tang Q., Hartel P., Jonker W., Efficient and Provable Secure Cipher -text Policy Attribute-based Encryption Schemes, 5451, pp. 1-12, (2009)
[8]  
Waters B., Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization, 6571, pp. 90-107
[9]  
Lewko A., Okamoto T., Sahai A., Katsuyuki T., Brent W., Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption, EUROCRYPT, 6110, pp. 62-91, (2010)
[10]  
Boneh D., Franklin M., Identity Based Encryption from the Weil Pairing[J], Journal of Computing, 32, 3, pp. 586-615, (2001)