A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy

被引:1
|
作者
Qi, Fang [1 ]
Li, Ke [1 ]
Tang, Zhe [1 ]
机构
[1] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
Multi-authority; Attribute-Based Encryption; Attribute Hierarchy; Attribute-path;
D O I
10.1109/ISPA/IUCC.2017.00097
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The existing attribute based encryption with attribute hierarchy program has only one authority, which causes serious performance bottlenecks. In order to solve the problem in hierarchical attribute based encryption, we proposes a multi-authority hierarchical attribute based encryption scheme. The scheme removes the trusted central authority, and prevents the communication between authorities, thereby ensuring the users' privacy and improving the system performance. We require that all the attributes in the system construct the attribute trees, and any attribute is represented by the attribute trees and the attribute path, which ensure that the users and ciphertexts attributes quickly matching. A user must have satisfactory attributes in order to decrypt. Additionally, we propose a more reasonable way of dividing attribute trees by using hierarchical clustering algorithm. Finally, we give out the correctness analysis and performance comparison analysis of the scheme. It meets the security of IND-sAtr-CPA based on the DBDH assumption in the standard model.
引用
收藏
页码:607 / 613
页数:7
相关论文
共 50 条
  • [41] Enhancing Attribute-Based Encryption with Attribute Hierarchy
    Li, Jin
    Wang, Qian
    Wang, Cong
    Ren, Kui
    [J]. MOBILE NETWORKS & APPLICATIONS, 2011, 16 (05): : 553 - 561
  • [42] Enhancing Attribute-Based Encryption with Attribute Hierarchy
    Jin Li
    Qian Wang
    Cong Wang
    Kui Ren
    [J]. Mobile Networks and Applications, 2011, 16 : 553 - 561
  • [43] Multi-authority Decentralized Attribute-Based Authorization Framework
    Sok, Kimheng
    Colin, Jean Noel
    Po, Kimtho
    [J]. ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS (CAISE 2022), 2022, 451 : 18 - 30
  • [44] Supervised Multi-Authority Scheme with Blind Signature for IoT with Attribute Based Encryption
    Nissenbaum, O. V.
    Ponomarov, K. Y.
    Zaharov, A. A.
    [J]. METROLOGY, STANDARDIZATION, QUALITY: THEORY AND PRACTICE, (MSQ-2017), 2018, 998
  • [45] SLIM: A Secure and Lightweight Multi-Authority Attribute-Based Signcryption Scheme for IoT
    Gong, Bei
    Guo, Chong
    Guo, Chong
    Guo, Chen
    Sun, Yao
    Waqas, Muhammad
    Chen, Sheng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 1299 - 1312
  • [46] Privacy-Preserving Online/Offline and Outsourced Multi-Authority Attribute-Based Encryption
    Shao, Jiaye
    Zhu, Yanqin
    Ji, Qijin
    [J]. 2017 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS 2017), 2017, : 285 - 291
  • [47] A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation
    Li, Jiguo
    Hu, Shengzhou
    Zhang, Yichen
    Han, Jinguang
    [J]. SOFT COMPUTING, 2020, 24 (03) : 1869 - 1882
  • [48] A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation
    Jiguo Li
    Shengzhou Hu
    Yichen Zhang
    Jinguang Han
    [J]. Soft Computing, 2020, 24 : 1869 - 1882
  • [49] Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing
    Yang, Yan
    Chen, Xingyuan
    Chen, Hao
    Du, Xuehui
    [J]. IEEE ACCESS, 2018, 6 : 18009 - 18021
  • [50] Multi-authority attribute-based encryption resilient against auxiliary-input leakage
    Ma, Hai-Ying
    Wang, Zhan-Jun
    Wang, Jin-Hua
    Guan, Zhi-Jin
    [J]. Journal of Computers (Taiwan), 2020, 31 (01) : 134 - 147