Attribute-based encryption schemes with constant-size ciphertexts

被引:122
|
作者
Attrapadung, Nuttapong [1 ]
Herranz, Javier [2 ]
Laguillaumie, Fabien [3 ,4 ]
Libert, Benoit [5 ]
de Panafieu, Elie [6 ]
Rafols, Carla [7 ]
机构
[1] AIST, Res Ctr Informat Security, Tokyo, Japan
[2] Univ Politecn Cataluna, Dept Matemat Aplicada 4, E-08028 Barcelona, Spain
[3] Univ Caen Basse Normandie, Lyon, France
[4] CNRS ENSL INRIA UCBL LIP, Lyon, France
[5] Catholic Univ Louvain, ICTEAM Inst, Crypto Grp, Louvain, Belgium
[6] Ecole Normale Super, Cachan, France
[7] Univ Rovira & Virgili, UNESCO Chair Data Privacy, Tarragona, Catalonia, Spain
关键词
Public-key cryptography; Provable security; Attribute-based encryption; Access control; Expressivity; Efficiency; IDENTITY-BASED ENCRYPTION; BROADCAST ENCRYPTION; FUNCTIONAL ENCRYPTION; SECURITY;
D O I
10.1016/j.tcs.2011.12.004
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attribute-based encryption (ABE), as introduced by Sahai and Waters, allows for fine-grained access control on encrypted data. In its key-policy flavor (the dual ciphertext-policy scenario proceeds the other way around), the primitive enables senders to encrypt messages under a set of attributes and private keys are associated with access structures that specify which ciphertexts the key holder will be allowed to decrypt. In most ABE systems, the ciphertext size grows linearly with the number of ciphertext attributes and the only known exception only supports restricted forms of access policies. This paper proposes the first attribute-based encryption (ABE) schemes allowing for truly expressive access structures and with constant ciphertext size. Our first result is a ciphertext-policy attribute-based encryption (CP-ABE) scheme with 0(1)-size ciphertexts for threshold access policies and where private keys remain as short as in previous systems. As a second result, we show that a certain class of identity-based broadcast encryption schemes generically yields monotonic key-policy attribute-based encryption (KP-ABE) systems in the selective set model. Our final contribution is a KP-ABE realization supporting non-monotonic access structures (i.e., that may contain negated attributes) with short ciphertexts. As an intermediate step toward this result, we describe a new efficient identity-based revocation mechanism that, when combined with a particular instantiation of our general monotonic construction, gives rise to the most expressive KP-ABE realization with constant-size ciphertexts. The downside of our second and third constructions is that private keys have quadratic size in the number of attributes. On the other hand, they reduce the number of pairing evaluations to a constant, which appears to be a unique feature among expressive KP-ABE schemes. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:15 / 38
页数:24
相关论文
共 50 条
  • [1] Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
    Attrapadung, Nuttapong
    Libert, Benoit
    de Panafieu, Elie
    PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 90 - +
  • [2] Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
    Susilo, Willy
    Yang, Guomin
    Guo, Fuchun
    Huang, Qiong
    INFORMATION SCIENCES, 2018, 429 : 349 - 360
  • [3] Attribute-based encryption with constant size ciphertexts
    Chen, Shao-Zhen
    Wang, Hai-Bin
    Tongxin Xuebao/Journal on Communications, 2011, 32 (11 A): : 190 - 195
  • [4] Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption
    Takashima, Katsuyuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 74 - 106
  • [5] Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
    Zhang, Yinghui
    Zheng, Dong
    Chen, Xiaofeng
    Li, Jin
    Li, Hui
    PROVABLE SECURITY, PROVSEC 2014, 2014, 8782 : 259 - 273
  • [6] Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsorced Verifiable Computation
    Zhang, Kai
    Gong, Junqing
    Tang, Shaohua
    Chen, Jie
    Li, Xiangxue
    Qian, Haifeng
    Cao, Zhenfu
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 269 - 279
  • [7] Constant Size Ciphertexts in Threshold Attribute-Based Encryption
    Herranz, Javier
    Laguillaumie, Fabien
    Rafols, Carla
    PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS, 2010, 6056 : 19 - +
  • [8] Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation
    Zhang, Xiao
    Wu, Faguo
    Yao, Wang
    Wang, Zhao
    Wang, Wenhua
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (21):
  • [9] Threshold Attribute-based Signcryption with Constant-Size Ciphertexts and Public Verifiability
    Han Yiliang
    Lu Wanyi
    Yang Xiaoyuan
    2013 32ND CHINESE CONTROL CONFERENCE (CCC), 2013, : 6373 - 6377
  • [10] ABKS-CSC: attribute-based keyword search with constant-size ciphertexts
    Yang, Ye
    Han, Jinguang
    Susilo, Willy
    Yuen, Tsz Hon
    Li, Jiguo
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5003 - 5015