Attribute-Based Encryption for Range Attributes

被引:22
作者
Attrapadung, Nuttapong [1 ]
Hanaoka, Goichiro [1 ]
Ogawa, Kazuto [2 ]
Ohtake, Go [2 ]
Watanabe, Hajime [1 ]
Yamada, Shota [1 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Tokyo, Japan
[2] Japan Broadcasting Corp NHK, Tokyo, Japan
来源
SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016 | 2016年 / 9841卷
关键词
FUNCTIONAL ENCRYPTION; BROADCAST ENCRYPTION; CIPHERTEXTS; SECURITY;
D O I
10.1007/978-3-319-44618-9_3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attribute-Based Encryption (ABE) is an advanced form of public-key encryption where access control mechanisms based on attributes and policies are possible. In conventional ABE, attributes are specified as strings. However, there are certain applications where it is useful to specify attributes as numerical values and consider a predicate that determines if a certain numerical range would include a certain value. Examples of these types of attributes include time, position coordinate, person's age, rank, identity, and so on. In this paper, we introduce ABE for boolean formulae over Range Membership (ABE-RM). We show generic methods to convert conventional ABE to ABE-RM. Our generic conversions are efficient as they introduce only logarithmic overheads (in key and ciphertext sizes), as opposed to trivial methods, which would pose linear overheads. By applying our conversion to previous ABE schemes, we obtain new efficient and expressive ABE-RM schemes. Previous works that considered ABE with range attributes are specific and can only deal with either a single relation of range membership (Paterson and Quaglia at SCN 2010, and Kasamatsu et al. at SCN 2012), or limited classes of policies, namely, only AND-gates of range attributes (Shi et al. at IEEE S&P 2007, and some subsequent work). Our schemes are generic and can deal with expressive boolean formulae.
引用
收藏
页码:42 / 61
页数:20
相关论文
共 40 条
[1]   A Study of Pair Encodings: Predicate Encryption in Prime Order Groups [J].
Agrawal, Shashank ;
Chase, Melissa .
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT II, 2016, 9563 :259-288
[2]  
[Anonymous], 1996, SECURE SCHEMES SECRE
[3]  
[Anonymous], IACR CRYPTOLOGY EPRI
[4]  
Attrapadung Nuttapong, 2015, Topics in Cryptology - CT-RSA 2015. The Cryptographers' Track at the RSA Conference 2015. Proceedings: LNCS 9048, P87, DOI 10.1007/978-3-319-16715-2_5
[5]  
Attrapadung N., 2016, FULL VERSION THIS PA
[6]   Attribute Based Encryption with Direct Efficiency Tradeoff [J].
Attrapadung, Nuttapong ;
Hanaoka, Goichiro ;
Matsumoto, Tsutomu ;
Teruya, Tadanori ;
Yamada, Shota .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 :249-266
[7]   Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs [J].
Attrapadung, Nuttapong ;
Hanaoka, Goichiro ;
Yamada, Shota .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 :575-601
[8]  
Attrapadung N, 2014, LECT NOTES COMPUT SC, V8441, P557, DOI 10.1007/978-3-642-55220-5_31
[9]   Attribute-based encryption schemes with constant-size ciphertexts [J].
Attrapadung, Nuttapong ;
Herranz, Javier ;
Laguillaumie, Fabien ;
Libert, Benoit ;
de Panafieu, Elie ;
Rafols, Carla .
THEORETICAL COMPUTER SCIENCE, 2012, 422 :15-38
[10]  
Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6