Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts

被引:102
|
作者
Deng, Hua [1 ,2 ]
Wu, Qianhong [2 ]
Qin, Bo [3 ]
Domingo-Ferrer, Josep [4 ]
Zhang, Lei [5 ]
Liu, Jianwei [2 ]
Shi, Wenchang [3 ]
机构
[1] Wuhan Univ, Sch Comp, Wuhan 430072, Peoples R China
[2] Beihang Univ, Sch Elect & Informat Engn, Beijing 100191, Peoples R China
[3] Renmin Univ China, Sch Informat, Beijing, Peoples R China
[4] Univ Rovira & Virgili, Dept Comp Engn & Math, Catalonia, Spain
[5] E China Normal Univ, Inst Software Engn, Shanghai 200062, Peoples R China
基金
北京市自然科学基金;
关键词
Cloud storage; Access control; Attribute-based encryption; Ciphertext-policy attribute-based; encryption; IDENTITY-BASED ENCRYPTION; DUAL SYSTEM ENCRYPTION; PREDICATE ENCRYPTION; MULTI-AUTHORITY; SECURITY; HIBE;
D O I
10.1016/j.ins.2014.01.035
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) systems allow encrypting to uncertain receivers by means of an access policy specifying the attributes that the intended receivers should possess. ABE promises to deliver fine-grained access control of encrypted data. However, when data are encrypted using an ABE scheme, key management is difficult if there is a large number of users from various backgrounds. In this paper, we elaborate on ABE and propose a new versatile cryptosystem referred to as ciphertext-policy hierarchical ABE (CP-HABE). In a CP-HABE scheme, the attributes are organized in a matrix and the users having higher-level attributes can delegate their access rights to the users at a lower level. These features enable a CP-HABE system to host a large number of users from different organizations by delegating keys, e.g., enabling efficient data sharing among hierarchically organized large groups. We construct a CP-HABE scheme with short ciphertexts. The scheme is proven secure in the standard model under non-interactive assumptions. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:370 / 384
页数:15
相关论文
共 50 条
  • [1] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    XU Peng
    TANG Yong
    JIANG Wenbin
    JIN Hai
    ZOU Deqing
    ChineseJournalofElectronics, 2014, 23 (04) : 655 - 660
  • [2] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    Xu Peng
    Tang Yong
    Jiang Wenbin
    Jin Hai
    Zou Deqing
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 655 - 660
  • [3] Ciphertext-policy attribute-based encryption with short keys
    Jiang, Wenbin, 1600, Chinese Institute of Electronics (23):
  • [4] Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts
    Jiang, Yinhao
    Susilo, Willy
    Mu, Yi
    Guo, Fuchun
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (04) : 463 - 475
  • [5] Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts
    Yinhao Jiang
    Willy Susilo
    Yi Mu
    Fuchun Guo
    International Journal of Information Security, 2018, 17 : 463 - 475
  • [6] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [7] Ciphertext-policy attribute-based delay encryption
    Chen, Lijiao
    Lv, Kewei
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (02) : 167 - 185
  • [8] Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
    Zhang, Yinghui
    Zheng, Dong
    Chen, Xiaofeng
    Li, Jin
    Li, Hui
    PROVABLE SECURITY, PROVSEC 2014, 2014, 8782 : 259 - 273
  • [9] Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption
    Anada, Hiroaki
    Arita, Seiko
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2017, : 423 - 428
  • [10] Server Aided Ciphertext-Policy Attribute-Based Encryption
    Wang, Hao
    Yang, Bo
    Wang, Yilei
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 440 - 444