Attributes Union in CP-ABE Algorithm for Large Universe Cryptographic Access Control

被引:9
作者
Cheng, Yong [1 ]
Ren, Jiangchun [1 ]
Wang, Zhiying [1 ]
Mei, Songzhu [1 ]
Zhou, Jie [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp Sci & Technol, Changsha, Hunan, Peoples R China
来源
SECOND INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING / SECOND INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING AND ITS APPLICATIONS (CGC/SCA 2012) | 2012年
关键词
CP-ABE; attributes union; cryptographic access control; large universe construction; ENCRYPTION; EFFICIENT;
D O I
10.1109/CGC.2012.13
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage is used wildly as online data storing and sharing paradigm today. And customers are willing to protect their data by cryptographic access control mechanisms. The ciphertext policy attribute based encryption (CP-ABE) algorithm is a promising technique for building cryptographic access control systems. Using CP-ABE schemes, customers can share their files selectively without defining an exact list of receivers. The main disadvantage of CP-ABE based access control systems is that the CP-ABE is inefficient and its overhead grows significantly with the size of universe attributes set. Existing researches solve this problem by adopting the random oracle, which only reduce the size of public parameters or the master secret key. In this paper we introduce a novel technique named attributes union, which can integrate a certain number of attributes into an attributes union. The core of attributes union is based on an arithmetic theorem. First, each attribute in the universe attributes set will be mapped with a unique prime element. Second, we can represent users' attributes set with the multiply product of all primes corresponding to the attributes in the set. Finally, the access structure can also be represented by attributes union based on the actual situation. We present an example CP-ABE construction with the attributes union, and proof that our construction is still secure against chosen plaintext attacks under the decisional Bilinear Diffie-Hellman assumption. Using attributes union we can also modify almost all existing CP-ABE algorithms and reduce their storage and computational overhead. We compare our scheme with other similar systems in terms of the size of keys and ciphertext and the computational time. The results show that our construction is more efficient thanks to attributes union.
引用
收藏
页码:180 / 186
页数:7
相关论文
共 24 条
[1]  
[Anonymous], 2001, ANN INT CRYPTOLOGY C
[2]  
[Anonymous], 2003, NDSS
[3]  
Beimel A., 1996, Secure schemes for secret sharing and key distribution
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[6]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[7]  
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[8]  
Damiani E., 2005, P ACM WORKSHOP STORA, P74
[9]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[10]  
Goyal V, 2008, LECT NOTES COMPUT SC, V5126, P579, DOI 10.1007/978-3-540-70583-3_47