A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram

被引:51
作者
Li, Long [1 ]
Gu, Tianlong [2 ]
Chang, Liang [3 ]
Xu, Zhoubo [3 ]
Liu, Yining [3 ]
Qian, Junyan [3 ]
机构
[1] Guilin Univ Elect Technol, Sch Electromech Engn, Guilin 541004, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Expt Ctr Informat Sci, Guilin 541004, Peoples R China
[3] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin 541004, Peoples R China
基金
中国国家自然科学基金;
关键词
Ciphertext-policy attribute-based encryption; ordered binary decision diagram; access structure; access policy; decryption; EFFICIENT; SECURE;
D O I
10.1109/ACCESS.2017.2651904
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-policy attribute-based encryption (CP- ABE) is widely used in many cyber physical systems and the Internet of things for guaranteeing information security. In order to improve the performance and efficiency of CP-ABE, this paper makes a change to the access structure of describing access polices in CP-ABE, and presents a new CP-ABE system based on the ordered binary decision diagram (OBDD). The new system makes full use of both the powerful description ability and the high calculating efficiency of OBDD. First, in the access structure, the new system allows multiple occurrences of the same attribute in a strategy, supports both positive attribute and negative attribute in the description of access polices, and can describe free-form access polices by using Boolean operations. Second, in the key generation stage, the size of secret keys generated by the new system is constant and not affected by the number of attributes; furthermore, time complexity of the key generation algorithm is O(1). Thirdly, in the encryption stage, both the time complexity of the encryption algorithm and the size of generated ciphertext are determined by the number of valid paths contained in the OBDD instead of the number of attributes occurring in access polices. Finally, in the decryption stage, the new system supports fast decryption and the time complexity of the decryption algorithm is only O(1). As a result, compared with existing CP-ABE schemes, the new system has better performance and efficiency. It is proved that the new CP-ABE system can also resist collision attack and chosen-plaintext attack under the decisional bilinear Diffie-Hellman assumption.
引用
收藏
页码:1137 / 1145
页数:9
相关论文
共 21 条
[1]  
AKERS SB, 1978, IEEE T COMPUT, V27, P509, DOI 10.1109/TC.1978.1675141
[2]  
[Anonymous], INF SCI
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]  
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
[5]  
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[6]   Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts [J].
Deng, Hua ;
Wu, Qianhong ;
Qin, Bo ;
Domingo-Ferrer, Josep ;
Zhang, Lei ;
Liu, Jianwei ;
Shi, Wenchang .
INFORMATION SCIENCES, 2014, 275 :370-384
[7]  
Drechsler R., 2001, International Journal on Software Tools for Technology Transfer, V3, P112, DOI 10.1007/s1O0090100056
[8]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[9]  
Li J., 2011, P 6 ACM S INF COMP C, P386
[10]  
Li Jiguo., 2017, IEEE T SERV COMPUT, V10, P785, DOI [DOI 10.1007/S10753-016-0405-4, DOI 10.1109/TSC.2016.2520932, DOI 10.1109/TSC.2016.2542813]