Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test

被引:0
作者
Liu, Weiran [1 ,2 ]
Liu, Jianwei [1 ,3 ]
Wu, Qianhong [1 ,3 ]
Qin, Bo [2 ]
Zhou, Yunya [1 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing 100191, Peoples R China
[2] Renmin Univ China, Sch Informat, Beijing, Peoples R China
[3] Acad Satellite Applicat, Beijing, Peoples R China
来源
COMPUTER SECURITY - ESORICS 2014, PT II | 2014年 / 8713卷
关键词
Attribute-Based Encryption; Chameleon Hash; Chosen Ciphertext Security; SIGNATURES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a direct Key-Policy Attribute-Based Encryption (KP-ABE) scheme with semantic security against adaptively chosen ciphertext attacks (CCA2) in the standard model. Compared with its counterpart with security against chosen-plaintext attacks (CPA), the cost of our scheme is only a Chameleon hash. In contrast to the Boyen-Mei-Waters shrink approach from CPA-secure (l + 1)-Hierarchical Identity Based Encryption ((l + 1)-HIBE) to CCA2-secure l-HIBE, our approach only adds one on-the-fly dummy attribute. Further, our approach only requires that the underlying ABE is selectively secure and allows public ciphertext test. A major obstacle for the security proof in this scenario is that the simulator cannot prepare the challenge ciphertext associated with the on-the-fly dummy attribute due to the selective security constraint. We circumvent this obstacle with a Chameleon hash. Technically, unlike existing use of Chameleon hash in (online/offline) signature applications, our work shows Chameleon hash can also have unique applications in encryption schemes.
引用
收藏
页码:91 / 108
页数:18
相关论文
共 33 条
[1]  
[Anonymous], 1996, SECURE SCHEMES SECRE
[2]  
[Anonymous], 2014, P 9 ACM S INFORM, DOI DOI 10.1145/2590296.2590342
[3]  
Ateniese G, 2005, LECT NOTES COMPUT SC, V3352, P165
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[6]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[7]  
Boyen X., 2005, Proc. 12th ACM Conference on Computer and Communications Security (CCS), P320
[8]   Chosen-ciphertext security from identity-based encryption [J].
Canetti, R ;
Halevi, S ;
Katz, J .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 :207-222
[9]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[10]  
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121