Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts

被引:102
作者
Deng, Hua [1 ,2 ]
Wu, Qianhong [2 ]
Qin, Bo [3 ]
Domingo-Ferrer, Josep [4 ]
Zhang, Lei [5 ]
Liu, Jianwei [2 ]
Shi, Wenchang [3 ]
机构
[1] Wuhan Univ, Sch Comp, Wuhan 430072, Peoples R China
[2] Beihang Univ, Sch Elect & Informat Engn, Beijing 100191, Peoples R China
[3] Renmin Univ China, Sch Informat, Beijing, Peoples R China
[4] Univ Rovira & Virgili, Dept Comp Engn & Math, Catalonia, Spain
[5] E China Normal Univ, Inst Software Engn, Shanghai 200062, Peoples R China
基金
北京市自然科学基金;
关键词
Cloud storage; Access control; Attribute-based encryption; Ciphertext-policy attribute-based; encryption; IDENTITY-BASED ENCRYPTION; DUAL SYSTEM ENCRYPTION; PREDICATE ENCRYPTION; MULTI-AUTHORITY; SECURITY; HIBE;
D O I
10.1016/j.ins.2014.01.035
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) systems allow encrypting to uncertain receivers by means of an access policy specifying the attributes that the intended receivers should possess. ABE promises to deliver fine-grained access control of encrypted data. However, when data are encrypted using an ABE scheme, key management is difficult if there is a large number of users from various backgrounds. In this paper, we elaborate on ABE and propose a new versatile cryptosystem referred to as ciphertext-policy hierarchical ABE (CP-HABE). In a CP-HABE scheme, the attributes are organized in a matrix and the users having higher-level attributes can delegate their access rights to the users at a lower level. These features enable a CP-HABE system to host a large number of users from different organizations by delegating keys, e.g., enabling efficient data sharing among hierarchically organized large groups. We construct a CP-HABE scheme with short ciphertexts. The scheme is proven secure in the standard model under non-interactive assumptions. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:370 / 384
页数:15
相关论文
共 37 条
[1]  
Abdalla M, 2007, LECT NOTES COMPUT SC, V4734, P139
[2]  
Beimel A., 1996, Secure schemes for secret sharing and key distribution
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[5]   Hierarchical identity based encryption with constant size ciphertext [J].
Boneh, D ;
Boyen, X ;
Goh, EJ .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :440-456
[6]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[7]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[8]   Identity-based key agreement protocols from pairings [J].
Chen, L. ;
Cheng, Z. ;
Smart, N. P. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (04) :213-241
[9]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[10]  
Goyal V, 2008, LECT NOTES COMPUT SC, V5126, P579, DOI 10.1007/978-3-540-70583-3_47