A fully secure KP-ABE scheme in the standard model

被引:0
作者
Zhang, Minqing [1 ,2 ]
Du, Weidong [2 ]
Yang, Xiaoyuan [2 ,3 ]
Han, Yiliang [3 ]
机构
[1] School of Computer Science, Northwestern Polytechnical University, Xi'an
[2] Key Laboratory of Network and Information Security of Chinese Armed Police Force, Engineering University of the Chinese Armed Police Force, Xi'an
[3] Institute of Information Security, Engineering University of the Chinese Armed Police Force, Xi'an
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2015年 / 52卷 / 08期
关键词
Dual encryption system; Fully security; Key-policy attribute-based encryption (KP-ABE); Selectively security; Standard model;
D O I
10.7544/issn1000-1239.2015.20140605
中图分类号
学科分类号
摘要
With the invention of many new applications such as social network and cloud storage, attribute-based encryption has been studied and applied widely because of its great flexibility, high efficiency and high security. As the current existing attributed-based encryption schemes are most selectively secure, which can't meet the need of the reality well, how to construct fully secure ABE has been the focus of cryptography. Aimed at the problems mentioned above, an key-policy ABE scheme is firstly constructed by using the dual encryption system in this paper, then the scheme is proved to fully secure in the standard model with the new ideas proposed by Lewko and Waters. Finally the comparison results show that the public and private key lengths of our scheme are similar to the selectively secure GPSW scheme, but our scheme is more secure. Compared with the Lewko-Waters scheme, our scheme has the same security, but has shorter public and private key lengths, which is more efficient. What's more, similar to the ciphertext-policy scheme of Lekwo-Waters, the techniques of selective security are also utilized in the security proof of our key-policy ABE, which is important in the research of the relation between the selective and full security models. ©, 2015, Science Press. All right reserved.
引用
收藏
页码:1893 / 1901
页数:8
相关论文
共 20 条
[1]  
Lewko A., Okamoto T., Sahai A., Et al., Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption [G], LNCS 6110: Advances in Cryptology (EUROCRYPT2010), pp. 62-91, (2010)
[2]  
Okamoto T., Takashima K., Adaptively attribute-hiding (hierarchical) inner product encryption [G], LNCS 7237: Advances in Cryptology (EUROCRYPT2012), pp. 591-608, (2012)
[3]  
Sahai A., Seyalioglu H., Waters B., Dynamic credentials and ciphertext delegation for attribute-based encryption [G], LNCS 7417: Advances in Cryptology (Crypto2012), pp. 199-217, (2012)
[4]  
Waters B., Functional encryption for regular languages [G], LNCS 7417: Advances in Cryptology (Crypto2012), pp. 218-235, (2012)
[5]  
Sahai A., Waters B., Attribute-based encryption for circuits from multi-linear maps [G], LNCS 8043: Advances in Cryptology (Crypto2013), pp. 479-499, (2013)
[6]  
Gorbunov S., Vaikuntanathan V., Wee H., Functional encryption with bounded collusions via multi-party computation [G], LNCS 7417: Advances in Cryptology (CRYPTO2012), pp. 162-179, (2012)
[7]  
Gorbunov S., Vaikuntanathan V., Wee H., Attribute-based encryption for circuits, Proc of the 45th Annual ACM Symp on Theory of Computing, pp. 545-554, (2013)
[8]  
Goyal V., Pandey O., Sahai A., Et al., Attribute-based encryption for finegrained access control of encrypted data, Proc of the 13th ACM Conf on Computer and Communications Security, pp. 89-98, (2006)
[9]  
Sahai A., Waters B., Fuzzy identity basedeEncryption [G], LNCS 3494: Advances in Cryptology (EUROCRYPT2005), pp. 457-473, (2005)
[10]  
Ostrovsky R., Sahai A., Waters B., Attribute-based encryption with nonmonotonic access structures, Proc of the 14th ACM Conf on Computer and Communication Security, pp. 195-203, (2007)