Provably Secure Ciphertext Policy ABE

被引:0
作者
Cheung, Ling [1 ]
Newport, Calvin [1 ]
机构
[1] MIT CSAIL, Cambridge, MA USA
来源
CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2007年
关键词
Access Control; Attribute-Based Encryption; Public Key Cryptography; IDENTITY-BASED ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on attributes. Decryption is enabled if and only if the user's attribute set satisfies the ciphertext access structure. This provides fine-grained access control on shared data in many practical settings; e.g., secure database and IP multicast. In this paper, we study CP-ABE schemes in which access structures are AND gates on positive and negative attributes. Our basic scheme is proven to be chosen plaintext (CPA) secure under the decisional bilinear Diffie-Hellman (DBDH) assumption. We then apply the Canetti-HaleviKatz technique to obtain a chosen ciphertext (CCA) secure extension using one-time signatures. The security proof is a reduction to the DBDH assumption and the strong existential unforgeability of the signature primitive. In addition; we introduce hierarchical attributes to optimize our basic scheme-reducing both ciphertext size and encryption/decryption time while maintaining CPA security. We conclude with a discussion of practical applications of CP-ABE.
引用
收藏
页码:456 / 465
页数:10
相关论文
共 50 条
[41]   Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation [J].
Shijie Deng ;
Gaobo Yang ;
Wen Dong ;
Ming Xia .
Multimedia Tools and Applications, 2023, 82 :22251-22274
[42]   Implementation of Ciphertext Policy-Attribute Based Encryption (CP-ABE) for Fine Grained Access Control of University Data [J].
Porwal, Shardha ;
Mittal, Sangeeta .
2017 TENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2017, :25-31
[43]   Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts [J].
Deng, Hua ;
Wu, Qianhong ;
Qin, Bo ;
Domingo-Ferrer, Josep ;
Zhang, Lei ;
Liu, Jianwei ;
Shi, Wenchang .
INFORMATION SCIENCES, 2014, 275 :370-384
[44]   TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain [J].
Gao, Sheng ;
Piao, Guirong ;
Zhu, Jianming ;
Ma, Xindi ;
Ma, Jianfeng .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) :5784-5798
[45]   Toward Secure Data Storage in Web 3.0: Ciphertext-Policy Attribute-Based Encryption [J].
Gong, Bei ;
Guo, Chong ;
Liu, Yi-Jing ;
Wang, Qian .
IEEE NETWORK, 2023, 37 (06) :42-49
[46]   Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption [J].
Rao, Y. Sreenivasa ;
Dutta, Ratna .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) :4157-4176
[47]   Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach [J].
Kim, Jongkil ;
Susilo, Willy ;
Baek, Joonsang ;
Nepal, Surya ;
Liu, Dongxi .
INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 :3-20
[48]   Compact Adaptively Secure ABE forNC1fromk-Lin [J].
Kowalczyk, Lucas ;
Wee, Hoeteck .
JOURNAL OF CRYPTOLOGY, 2020, 33 (03) :954-1002
[49]   Provably Secure Self-Extractable Encryption [J].
Liang, Zhi ;
Wu, Qianhong ;
Liu, Weiran ;
Liu, Jianwei ;
Xiao, Fu .
PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 :3-23
[50]   Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts [J].
Lai, Jianchang ;
Guo, Fuchun ;
Susilo, Willy ;
Jiang, Peng ;
Yang, Guomin ;
Huang, Xinyi .
INFORMATION SCIENCES, 2022, 613 :966-981