Fully Secure Online/Offline Predicate and Attribute-Based Encryption

被引:17
作者
Datta, Pratish [1 ]
Dutta, Ratna [1 ]
Mukhopadhyay, Sourav [1 ]
机构
[1] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
来源
INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015 | 2015年 / 9065卷
关键词
Predicate encryption; attribute based encryption; online/offline encryption; generalized inner-product; dual pairing vector spaces;
D O I
10.1007/978-3-319-17533-1_23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the first fully secure online/offline predicate encryption (PE) and attribute-based encryption (ABE) schemes that split the computation required for encryption into two phases: A preparation phase that does the vast majority of the work to encrypt a message before knowing the actual message and the attributes or access control policy that will be used. A second phase can then rapidly assemble a ciphertext when the specifications become known. Our PE schemes support generalized inner-product predicates, while, our ABE scheme supports non-monotone access structures. All the proposed schemes are unbounded in the sense that the size of the public parameters is constant. The security of all the schemes are based on the Decisional Linear assumption. The best part of our constructions is that they exhibit better online performance despite of providing stronger security guarantees compared to the existing work.
引用
收藏
页码:331 / 345
页数:15
相关论文
共 10 条
  • [1] Hohenberger S, 2014, LECT NOTES COMPUT SC, V8383, P293, DOI 10.1007/978-3-642-54631-0_17
  • [2] Katz J, 2008, LECT NOTES COMPUT SC, V4965, P146
  • [3] Lewko A, 2011, LECT NOTES COMPUT SC, V6632, P547, DOI 10.1007/978-3-642-20465-4_30
  • [4] Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
    Lewko, Allison
    Okamoto, Tatsuaki
    Sahai, Amit
    Takashima, Katsuyuki
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 62 - +
  • [5] Okamoto T, 2012, LECT NOTES COMPUT SC, V7658, P349, DOI 10.1007/978-3-642-34961-4_22
  • [6] Okamoto T, 2012, LECT NOTES COMPUT SC, V7237, P591, DOI 10.1007/978-3-642-29011-4_35
  • [7] Okamoto T, 2010, LECT NOTES COMPUT SC, V6223, P191, DOI 10.1007/978-3-642-14623-7_11
  • [8] Okamoto T, 2009, LECT NOTES COMPUT SC, V5912, P214, DOI 10.1007/978-3-642-10366-7_13
  • [9] Rouselakis Y., 2013, P 2013 ACM SIGSAC C, P463
  • [10] Fuzzy identity-based encryption
    Sahai, A
    Waters, B
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 457 - 473