Ciphertext-policy attribute-based delay encryption

被引:0
|
作者
Chen, Lijiao [1 ,2 ,3 ,4 ]
Lv, Kewei [1 ,2 ,3 ,4 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
[4] Chinese Acad Sci, Data Assurance & Commun Secur Res Ctr, Beijing 100093, Peoples R China
基金
国家重点研发计划;
关键词
ciphertext-policy attribute-based encryption; CP-ABE; time-lock puzzle; TLP; access control; timed-release; delay;
D O I
10.1504/IJICS.2023.134960
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Timed-release CP-ABE can provide fine-grained and timed-release access control while ensuring data confidentiality. Existing schemes usually rely on a trusted third-party called time server. This paper proposes a novel timed-release CP-ABE scheme named ciphertext-policy attribute-based delay encryption (CP-ABDE), which does not require a time server. Specifically, we formalise the notion of CP-ABDE and its system model and security model. Furthermore, we provide a formal construction that is secure under the decisional bilinear Diffie-Hellman assumption and repeated squaring assumption. Finally, performance analysis shows that the scheme performs well while achieving timed-release access control.
引用
收藏
页码:167 / 185
页数:20
相关论文
共 50 条
  • [1] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [2] Server Aided Ciphertext-Policy Attribute-Based Encryption
    Wang, Hao
    Yang, Bo
    Wang, Yilei
    [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 440 - 444
  • [3] Securely outsourcing the ciphertext-policy attribute-based encryption
    Kim Thuat Nguyen
    Oualha, Nouha
    Laurent, Maryline
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01): : 169 - 183
  • [4] GPU Acceleration of Ciphertext-Policy Attribute-Based Encryption
    Fan, Kai
    Zhang, Chaoyu
    Shan, Ruiwen
    Yu, Hexuan
    Jiang, Hai
    [J]. 2019 20TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2019, : 94 - 101
  • [5] Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme
    Asim, Muhammad
    Ibraimi, Luan
    Petkovic, Milan
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 244 - +
  • [6] An Improved Ciphertext-Policy Attribute-Based Encryption Scheme
    Zheng, Hua
    Zhang, Xi
    Yang, Qi
    [J]. SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 400 - 411
  • [7] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    XU Peng
    TANG Yong
    JIANG Wenbin
    JIN Hai
    ZOU Deqing
    [J]. Chinese Journal of Electronics, 2014, 23 (04) : 655 - 660
  • [8] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    Xu Peng
    Tang Yong
    Jiang Wenbin
    Jin Hai
    Zou Deqing
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 655 - 660
  • [9] Securely outsourcing the ciphertext-policy attribute-based encryption
    Kim Thuat Nguyen
    Nouha Oualha
    Maryline Laurent
    [J]. World Wide Web, 2018, 21 : 169 - 183
  • [10] Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    [J]. SENSORS, 2019, 19 (07)