Key-policy attribute-based encryption scheme for general circuits

被引:0
|
作者
Hu P. [1 ]
Gao H.-Y. [1 ]
机构
[1] Information Engineering University, Zhengzhou
来源
Ruan Jian Xue Bao/Journal of Software | 2016年 / 27卷 / 06期
基金
中国国家自然科学基金;
关键词
Attribute-based encryption; Cross layer output; General circuit; Multilinear map; Selective security;
D O I
10.13328/j.cnki.jos.004993
中图分类号
学科分类号
摘要
Through introducing the access structure into attribute-based encryption, users can achieve the fine-grained access control to the ciphertext. Any access structure can be realized by general circuit. Therefore, designing attribute-based encryption for general circuit is difficult in this field. Garg etc. presented the first general circuit access structure based on multilinear maps. However the usability of the access structures is rather limited as gate can only output layer by layer and the depth of the circuit are fixed in l. In order to solve this limitation, this paper proposes a key-policy attribute-based encryption scheme for general circuits based on the Garg's scheme. In key generation step, the new scheme implements any circuit that depth is greater than 1 and less than or equal to l by equivalent conversion of the circuit and addition of the conversion key. It also achieves cross layer output by adding its child node depth into every non-leaf node's key component. Selective security of the proposed scheme in the standard model is proved under the decisional multilinear Diffie-Hellman assumption. © Copyright 2016, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:1498 / 1510
页数:12
相关论文
共 14 条
  • [1] Sahai A., Waters B., Fuzzy identity-based encryption, Proc. of the EUROCRYPT 2005, pp. 457-473, (2005)
  • [2] Goyal V., Pandey O., Sahai A., Waters B., Attribute-Based encryption for fine grained access control of encrypted data, Proc. of the ACM Conf. on Computer and Communications Security, pp. 89-98, (2006)
  • [3] Bethencourt J., Sahai A., Waters B., Ciphertext-Policy attribute-based encryption, Proc. of the IEEE Symp. on Security and Privacy, pp. 321-334, (2007)
  • [4] Garg S., Gentry C., Halevi S., Sahai A., Waters B., Attribute-Based encryption for circuits from multilinear maps, Advances in Cryptology CRYPTO 2013, pp. 479-499, (2013)
  • [5] Garg S., Gentry C., Halevi S., Candidate multilinear maps from ideal lattices, Proc. of the EUROCRYPT 2013, pp. 1-17, (2013)
  • [6] Kangro K., On attribute-based encryption for circuits from multilinear maps, (2013)
  • [7] Stinson D., Cryptography: Theory and Practice, (2005)
  • [8] Osreovsky R., Sahai A., Waters B., Attribute-Based encryption with non-monotonic access structures, Proc. of the 14th ACM Conf. on Computer and Communications Security, pp. 195-203, (2007)
  • [9] Bellare M., Hoang V.T., Rogaway P., Foundations of garbled circuits, Proc. of the 2012 ACM Conf. on Computer and Communications Security, pp. 784-796, (2012)
  • [10] Boneh D., Franklin M.K., Identity-Based encryption from the Weil pairing, Proc. of the 21st Annual Int'l Cryptology Conf. on Advances in Cryptology, pp. 213-229, (2001)