Efficient attribute-based encryption with hidden access structures

被引:1
作者
Xie, Li [1 ]
Ren, Yanli [1 ]
机构
[1] School of Communication and Information Engineering, Shanghai Univ., Shanghai
来源
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University | 2015年 / 42卷 / 03期
关键词
Asymmetry pairings; Attribute-based encryption; Full security; Hidden access structures;
D O I
10.3969/j.issn.1001-2400.2015.03.017
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, Attribute-Based Encryption (ABE) schemes with Hidden Access Structures are proposed in groups of a composite order or only proved selectively secure without random oracles. Using asymmetric pairings, an anonymous ciphertext-policy attribute-based encryption scheme is proposed in a prime order bilinear group in this paper. The scheme is proved fully secure under the standard model based on the asymmetric decisional bilinear Diffie-Hellman (DBDH) assumption. Moreover, it has a constant size private key, a ciphertext and the number of pairing operations. The proposed scheme improves the security and efficiency of ABE schemes with hidden access structures when compared with the ones in groups of a composite order. ©, 2015, Science Press. All right reserved.
引用
收藏
页码:97 / 102
页数:5
相关论文
共 22 条
[1]  
Sahai A., Waters B., Fuzzy Identity-based Encryption, Proceeding of EUROCRYPT'05, pp. 457-473, (2005)
[2]  
Waters B., Efficient Identity-based Encryption without Random Oracles, Proceedings of EUROCRYPT'05, pp. 114-127, (2005)
[3]  
Waters B., Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions, Proceedings of CRYPTO'09, pp. 619-636, (2009)
[4]  
Fu X., Xue P., Identity-based Preserving Multi-receiver Key Encapsulation, Journal of Xidian University, 41, 5, pp. 8-13, (2014)
[5]  
Sun J., Hu Y., Fully Secure Attribute-based Broadcast Encryption, Journal of Xidian University, 39, 4, pp. 23-28, (2012)
[6]  
Goyal V., Pandey O., Sahai A., Et al., Attribute-based Encryption for Fine-grained Access Control of Encrypted Data, Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89-98, (2006)
[7]  
Bethencourt J., Sahai A., Waters B., Ciphertext-policy Attribute-based Encryption, Proceeding of the 2007 IEEE Symposium on Security and Privacy, pp. 321-334, (2007)
[8]  
Cheung L., Newport C., Provably Secure Ciphertext Policy ABE, Proceeding of the 14th ACM Conference on Computer and Communications Security, pp. 456-465, (2007)
[9]  
Waters B., Ciphertext-policy Attribute-based Encryption: an Expressive, Efficient, and Provably Secure Realization, Proceedings of PKC 2011 Computer Science, pp. 53-70, (2011)
[10]  
Okamoto T., Takashima K., Fully Secure Unbounded Inner-product and Attribute-based Encryption, Proceedings of ASIACRYPT'12, pp. 349-366, (2012)