Anonymous attribute-based broadcast encryption with hidden multiple access structures

被引:0
|
作者
Phuong, Tran Viet Xuan [1 ,2 ]
机构
[1] Old Dominion Univ, Sch Cybersecur, Norfolk, VA 23529 USA
[2] Univ Arkansas Little Rock, Dept Comp Sci, Little Rock, AR 72204 USA
关键词
Anonymous; Broadcast; Attribute based; Viete; OR/AND gates; Wildcard; Polynomial; Root; CIPHERTEXTS; SCHEME;
D O I
10.1007/s10623-024-01373-2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to the high demands of data communication, the broadcasting system streams the data daily. This service not only sends out the message to the correct participant but also respects the security of the identity user. In addition, when delivered, all the information must be protected for the party who employs the broadcasting service. Currently, Attribute-Based Broadcast Encryption (ABBE) is useful to apply for the broadcasting service. (ABBE) is a combination of Attribute-Based Encryption (ABE) and Broadcast Encryption (BE), which allows a broadcaster (or encrypter) to broadcast an encrypted message, including a predefined user set and specified access policy to install the authorization mechanism. It is desirable to hide all the information when producing in the ciphertext, which has not been considered in the previous works of ABBE. Motivated by the above issue, we devise a solution to achieve anonymity for the ABBE scheme, which not only hides the access structures but also anonymizes the user's identity. In this work, we propose two schemes as Anonymous Key Policy (AKP)-ABBE and Anonymous Ciphertext Policy (ACP)-ABBE with supporting multiple access structures by using OR / AND \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\textsf {OR}/\textsf {AND}$$\end{document} gates. Specifically, we present the generic constructions of AKP/ACP-ABBE on the building block of the Inner Product Encryption ( IPE \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\textsf {IPE}$$\end{document} ), which enables the hidden user's identity and complex OR / AND \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\textsf {OR}/\textsf {AND}$$\end{document} -Gate access structure. We show that our proposed schemes are secured under the standard models.
引用
收藏
页码:1925 / 1945
页数:21
相关论文
共 50 条
  • [31] Levelled attribute-based encryption for hierarchical access control
    Le, Huy Quoc
    Le, Phi Thuong
    Trinh, Sy Tuan
    Susilo, Willy
    Trinh, Viet Cuong
    [J]. Computer Standards and Interfaces, 2025, 93
  • [32] On the Feasibility of Attribute-Based Encryption for WLAN Access Control
    Pisa, Claudio
    Dargahi, Tooska
    Caponi, Alberto
    Bianchi, Giuseppe
    Blefari-Melazzi, Nicola
    [J]. 2017 IEEE 13TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2017, : 783 - 790
  • [33] Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
    Yin, Hongjian
    Zhang, Leyou
    Cui, Yilei
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (05): : 2768 - 2780
  • [34] Attribute-based encryption
    Sahai, Amit
    Waters, Brent
    Lu, Steve
    [J]. Cryptology and Information Security Series, 2009, 2 : 156 - 168
  • [35] Efficient and Expressive Anonymous Attribute-Based Encryption for Mobile Cloud Computing
    Zhang, Yinghui
    Zheng, Dong
    [J]. ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 807 - 814
  • [36] A New Technique for Compacting Secret Key in Attribute-Based Broadcast Encryption
    Canard, Sebastien
    Phan, Duong Hieu
    Viet Cuong Trinh
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 594 - 603
  • [37] Blockchain-Based Multiple Authorities Attribute-Based Encryption for EHR Access Control Scheme
    Yang, Xiaohui
    Zhang, Chenshuo
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (21):
  • [38] Cross-Domain Attribute-Based Access Control Encryption
    Sedaghat, Mahdi
    Preneel, Bart
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2021, 2021, 13099 : 3 - 23
  • [39] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Zhong, Hong
    Zhu, Wenlong
    Xu, Yan
    Cui, Jie
    [J]. SOFT COMPUTING, 2018, 22 (01) : 243 - 251
  • [40] ABSTRACT: Access Control in Searchable Encryption with the use of Attribute-Based Encryption and SGX
    Michalas, Antonis
    Bakas, Alexandros
    Hai-Van Dang
    Zalitko, Alexandr
    [J]. CCSW'19: PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON CLOUD COMPUTING SECURITY WORKSHOP, 2019, : 183 - 183