Efficient attribute-based encryption with hidden access structures

被引:1
|
作者
School of Communication and Information Engineering, Shanghai Univ., Shanghai [1 ]
200444, China
机构
来源
关键词
Asymmetry pairings - Attribute-based encryptions - Bilinear groups - Ciphertext-policy attribute-based encryptions - Full security - Hidden access structures - The standard model - Without random oracles;
D O I
10.3969/j.issn.1001-2400.2015.03.017
中图分类号
学科分类号
摘要
Currently, Attribute-Based Encryption (ABE) schemes with Hidden Access Structures are proposed in groups of a composite order or only proved selectively secure without random oracles. Using asymmetric pairings, an anonymous ciphertext-policy attribute-based encryption scheme is proposed in a prime order bilinear group in this paper. The scheme is proved fully secure under the standard model based on the asymmetric decisional bilinear Diffie-Hellman (DBDH) assumption. Moreover, it has a constant size private key, a ciphertext and the number of pairing operations. The proposed scheme improves the security and efficiency of ABE schemes with hidden access structures when compared with the ones in groups of a composite order. ©, 2015, Science Press. All right reserved.
引用
收藏
相关论文
共 50 条
  • [1] Attribute-based encryption with Hidden access structures
    Wang, Hai-Bin
    Chen, Shao-Zhen
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2012, 34 (02): : 457 - 461
  • [3] Practically Efficient Attribute-based Encryption for Compartmented Access Structures
    Tiplea, Ferucio Laurentiu
    Ionita, Alexandru
    Nica, Anca Maria
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 201 - 212
  • [4] Attribute-based encryption with partially hidden encryptor-specified access structures
    Nishide, Takashi
    Yoneyama, Kazuki
    Ohta, Kazuo
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2008, 5037 : 111 - 129
  • [5] Efficient Anonymous Attribute-Based Encryption with Access Policy Hidden for Cloud Computing
    Huang, Chanying
    Yan, Kedong
    Wei, Songjie
    Zhang, Gongxuan
    Lee, Dong Hoon
    [J]. PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC 2017), 2017, : 266 - 270
  • [6] An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures
    Cui, Hui
    Deng, Robert H.
    Wu, Guowei
    Lai, Junzuo
    [J]. PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 19 - 38
  • [7] Efficient Revocable Attribute-Based Encryption with Hidden Policies
    Ziegler, Dominik
    Marsalek, Alexander
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1638 - 1645
  • [8] Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures
    Chen, Yang
    Li, Wenmin
    Gao, Fei
    Yin, Wei
    Liang, Kaitai
    Zhang, Hua
    Wen, Qiaoyan
    [J]. COMPUTER JOURNAL, 2019, 62 (12): : 1748 - 1760
  • [9] An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited
    Cui, Hui
    Deng, Robert H.
    Lai, Junzuo
    Yi, Xun
    Nepal, Surya
    [J]. COMPUTER NETWORKS, 2018, 133 : 157 - 165
  • [10] Attribute-Based Encryption with Non-Monotonic Access Structures
    Ostrovsky, Rafail
    Sahai, Amit
    Waters, Brent
    [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 195 - +