A Key-policy Attribute-based Encryption Scheme with Constant Size Ciphertext

被引:23
|
作者
Wang, Chang-Ji [1 ]
Luo, Jian-Fa [1 ]
机构
[1] Sun Yat Sen Univ, Sch Informat Sci & Technol, Guangzhou 510275, Guangdong, Peoples R China
关键词
identity-based broadcast encryption; key-policy attribute-based encryption; cloud computing; constant size ciphertexts; general Diffie-Hellman exponent assumption;
D O I
10.1109/CIS.2012.106
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Attribute-based encryption (ABE) is a new cryptographic primitive which provides a promising tool for addressing the problem of secure and fine-grained data sharing and decentralized access control. Key-policy attribute-based encryption (KP-ABE) is an important class of ABE, where ciphertexts are labeled with sets of attributes and private keys are associated with access structures that control which ciphertexts a user is able to decrypt. KP-ABE has important applications in data sharing on untrusted cloud storage. However, the ciphertext size grows linearly with the number of attributes embedded in ciphertext in most existing KP-ABE schemes. In this paper, we describe our work on designing a KP-ABE scheme with constant size ciphertext for monotonic access structures. The downside of the proposed KP-ABE scheme is that private keys have multiple size growth in the number of attributes in the access structure. The proposed KP-ABE scheme is proved to be secure under the general Diffie-Hellman exponent assumption.
引用
收藏
页码:447 / 451
页数:5
相关论文
共 50 条
  • [1] An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
    Wang, Changji
    Luo, Jianfa
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [2] Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
    Attrapadung, Nuttapong
    Libert, Benoit
    de Panafieu, Elie
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 90 - +
  • [3] Direct Revocable Ciphertext Policy Attribute-Based Encryption Scheme with Constant-Size Ciphertext
    Zhu, Guo-Bin
    Xie, Xin
    Zhang, Xing
    Zhao, Yang
    Xiong, Hu
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2021, 50 (01): : 76 - 83
  • [4] Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
    Shi, Yanfeng
    Zheng, Qingji
    Liu, Jigiang
    Han, Zhen
    [J]. INFORMATION SCIENCES, 2015, 295 : 221 - 231
  • [5] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
    Emura, Keita
    Miyaji, Atsuko
    Nomura, Akito
    Omote, Kazumasa
    Soshi, Masakazu
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 13 - +
  • [6] KEY-POLICY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR GENERAL CIRCUITS
    Bolocan, Diana
    [J]. PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2020, 21 (01): : 11 - 19
  • [7] A Key-Policy Attribute-Based Broadcast Encryption
    Sun, Jin
    Hu, Yupu
    Zhang, Leyou
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (05) : 444 - 452
  • [8] Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    Zhou, Yunya
    [J]. COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 91 - 108
  • [9] An Attribute-Based Encryption Scheme with LSSS Key-Policy from Lattices
    Liu, Lihua
    Wang, Shangping
    [J]. LECTURE NOTES IN REAL-TIME INTELLIGENT SYSTEMS (RTIS 2016), 2018, 613 : 217 - 230
  • [10] Hierarchical Authority Key-Policy Attribute-Based Encryption
    You, Lin
    Wang, Lijun
    [J]. 2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 868 - 872