Traceable Ciphertet-Policy Attribute-Based Encryption with Constant Decryption

被引:2
作者
Wang, Guangbo [1 ]
Li, Feng [1 ]
Wang, Pengcheng [1 ]
Hu, Yixiao [1 ]
机构
[1] Beijing Sci & Technol Informat Res Ctr, Beijing 100036, Peoples R China
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2021年 / 15卷 / 09期
关键词
ciphertext-policy; traceability; constant decryption; CP-ABE; SECRET KEYS; DEVICES;
D O I
10.3837/tiis.2021.09.017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We provide a traceable ciphertext-policy attribute based encryption (CP-ABE) construction for monotone access structures (MAS) based on composite order bilinear groups, which is secure adaptively under the standard model. We construct this scheme by making use of an "encoding technique" which represents the MAS by their minimal sets to encrypt the messages. To date, for all traceable CP-ABE schemes, their encryption costs grow linearly with the MAS size, the decryption costs grow linearly with the qualified rows in the span programs. However, in our traceable CP-ABE, the ciphertext is linear with the minimal sets, and decryption needs merely three bilinear pairing computations and two exponent computations, which improves the efficiency extremely and has constant decryption. At last, the detailed security and traceability proof is given.
引用
收藏
页码:3401 / 3420
页数:20
相关论文
共 21 条
  • [1] BETHENCOURT J, 2011, ADV CRYPTO SOFTWARE
  • [2] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [3] Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
  • [4] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
  • [5] Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
  • [6] Goyal V., 2006, P 2006 INT C PRIVACY, P1
  • [7] Goyal V, 2008, LECT NOTES COMPUT SC, V5126, P579, DOI 10.1007/978-3-540-70583-3_47
  • [8] Lewko A, 2010, LECT NOTES COMPUT SC, V5978, P455, DOI 10.1007/978-3-642-11799-2_27
  • [9] Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
    Lewko, Allison
    Okamoto, Tatsuaki
    Sahai, Amit
    Takashima, Katsuyuki
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 62 - +
  • [10] White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures
    Liu, Zhen
    Cao, Zhenfu
    Wong, Duncan S.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (01) : 76 - 88