Cross-Domain Attribute-Based Access Control Encryption

被引:2
|
作者
Sedaghat, Mahdi [1 ]
Preneel, Bart [1 ]
机构
[1] Katholieke Univ Leuven, Imec COSIC, Leuven, Belgium
来源
关键词
Access Control Encryption; Ciphertext-Policy; Attribute-Based Encryption; Structure-Preserving Signature; Non-Interactive Zero-Knowledge Proofs; FUNCTIONAL ENCRYPTION; IDENTIFICATION; SIGNATURES;
D O I
10.1007/978-3-030-92548-2_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Logic access control enforces who can read and write data; the enforcement is typically performed by a fully trusted entity. At TCC 2016, Damga'rd et al. proposed Access Control Encryption (ACE) schemes where a predicate function decides whether or not users can read (decrypt) and write (encrypt) data, while the message secrecy and the users' anonymity are preserved against malicious parties. Subsequently, several ACE constructions with an arbitrary identity-based access policy have been proposed, but they have huge ciphertext and key sizes and/or rely on indistinguishability obfuscation. At IEEE S&P 2021, Wang and Chow proposed a Cross-Domain ACE scheme with constant-size ciphertext and arbitrary identity-based policy; the key generators are separated into two distinct parties, called Sender Authority and Receiver Authority. In this paper, we improve over their work with a novel construction that provides a more expressive access control policy based on attributes rather than on identities, the security of which relies on standard assumptions. Our generic construction combines Structure-Preserving Signatures, Non-Interactive Zero-Knowledge proofs, and Rerandomizable Ciphertext-Policy Attribute-Based Encryption schemes. Moreover, we propose an efficient scheme in which the sizes of ciphertexts and encryption and decryption keys are constant and thus independent of the number of receivers and their attributes. Our experiments demonstrate that not only is our system more flexible, but it also is more efficient and results in shorter decryption keys (reduced from about 100 to 47 bytes) and ciphertexts (reduced from about 1400 to 1047).
引用
收藏
页码:3 / 23
页数:21
相关论文
共 50 条
  • [1] An Attribute-Based Cross-Domain Access Control Model for a Distributed Multiple Autonomous Network
    Zhang, Yunpeng
    Liu, Xin
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2020, 30 (11-12) : 1851 - 1865
  • [2] An efficient hierarchical attribute-based encryption scheme with cross-domain data sharing
    Yang, Guangcan
    Peixuan Li
    Xin, Yang
    He, Yunhua
    Wang, Chao
    Chen, Xiubo
    [J]. Computer Networks, 2024, 255
  • [3] The Research of Cross-Domain Access Control Based on Attribute Mapping
    Mu, Ling-ling
    Gao, Yan-yan
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 95 - 100
  • [4] Levelled attribute-based encryption for hierarchical access control
    Le, Huy Quoc
    Le, Phi Thuong
    Trinh, Sy Tuan
    Susilo, Willy
    Trinh, Viet Cuong
    [J]. Computer Standards and Interfaces, 2025, 93
  • [5] On the Feasibility of Attribute-Based Encryption for WLAN Access Control
    Pisa, Claudio
    Dargahi, Tooska
    Caponi, Alberto
    Bianchi, Giuseppe
    Blefari-Melazzi, Nicola
    [J]. 2017 IEEE 13TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2017, : 783 - 790
  • [6] An attribute-based cross-domain trustworthy model for internet of vehicles
    Ou, Wei
    Yi, Qin
    Hu, Jiao
    Liu, Dingwan
    Liu, Wei
    Yan, Wanqin
    [J]. INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2021, 14 (1-2) : 4 - 27
  • [7] CD-ABSE: Attribute-Based Searchable Encryption Scheme Supporting Cross-Domain Sharing on Blockchain
    Guo, Kaiyang
    Han, Yiliang
    Wu, Riming
    Liu, Kai
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [8] Attribute-based Encryption for Access Control Using Elementary Operations
    Crampton, Jason
    Pinto, Alexandre
    [J]. 2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2014, : 125 - 139
  • [9] On Attribute-Based Encryption for Access Control to Multidimensional Data Structures
    Epishkina, Anna
    Zapechnikov, Sergey
    [J]. BIOLOGICALLY INSPIRED COGNITIVE ARCHITECTURES (BICA) FOR YOUNG SCIENTISTS, 2018, 636 : 251 - 256
  • [10] Attribute-based Encryption for Cloud Computing Access Control: A Survey
    Zhang, Yinghui
    Deng, Robert H.
    Xu, Shengmin
    Sun, Jianfei
    Li, Qi
    Zheng, Dong
    [J]. ACM COMPUTING SURVEYS, 2020, 53 (04)