Ciphertext-Policy Attribute-Based Encryption for General Circuits from Bilinear Maps

被引:2
|
作者
HU Peng [1 ]
GAO Haiying [1 ]
机构
[1] School of Information Security,Zhengzhou Information and Technology Institute
基金
中国国家自然科学基金;
关键词
ciphertext-policy attribute-based encryption; general circuits; bilinear maps; selective security;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
In this paper,we present the first ciphertext-policy attribute-based encryption(CP-ABE)scheme for polynomial-size general circuits based on bilinear maps which is more suitable for practical use and more efficient than multilinear maps. Our scheme uses a top-down secret sharing and FANOUT gate to resist the "backtracking attack" which is the main barrier expending access tree to general circuit. In the standard model,selective security of our scheme is proved. Comparing with current scheme for general circuits from bilinear maps,our work is more efficient.
引用
收藏
页码:171 / 177
页数:7
相关论文
共 50 条
  • [41] Enhancing Data Privacy Protection in Ciphertext-Policy Attribute-Based Encryption
    Patil, Sachin Popat
    Basthikodi, Mustafa
    Kumaraswamy, S.
    Gurpur, Ananth Prabhu
    Raga, Akashraj
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (03) : 1113 - 1124
  • [42] Expressive ciphertext-policy attribute-based encryption with direct user revocation
    Bai C.
    Zhang Y.
    Ma H.
    Liu Z.
    International Journal of Embedded Systems, 2017, 9 (06) : 495 - 504
  • [43] Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption
    Wang, Geng
    Liu, Zhen
    Gu, Dawu
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 378 - 396
  • [44] Large Universe Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation
    Sun, Lei
    Wang, Shuaili
    Li, Zuohui
    Wang, Guangbo
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, AUTOMATION AND MECHANICAL ENGINEERING (EAME 2017), 2017, 86 : 243 - 249
  • [45] Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage
    Li, Jiguo
    Shi, Yuerong
    Zhang, Yichen
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)
  • [46] Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating
    Ying, Zuobin
    Li, Hui
    Ma, Jianfeng
    Zhang, Junwei
    Cui, Jiangtao
    SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (04)
  • [47] Traceable-then-revocable ciphertext-policy attribute-based encryption scheme
    Liu, Zhenhua
    Duan, Shuhong
    Zhou, Peilin
    Wang, Baocang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 903 - 913
  • [48] Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes
    Ibraimi, Luan
    Tang, Qiang
    Hartel, Pieter
    Jonker, Willem
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 1 - 12
  • [49] A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption
    Malluhi, Qutaibah M.
    Shikfa, Abdullatif
    Viet Cuong Trinh
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 230 - 240
  • [50] Extensions to ciphertext-policy attribute-based encryption to support distributed environments
    Servos, Daniel
    Mohammed, Sabah
    Fiaidhi, Jinan
    Kim, Tai Hoon
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2013, 47 (2-3) : 215 - 226