Practical Large Universe Attribute-Set Based Encryption in the Standard Model

被引:0
|
作者
Feng, Xinyu [1 ,2 ]
Jin, Cancan [1 ,2 ]
Li, Cong [1 ,2 ]
Fang, Yuejian [1 ,2 ]
Shen, Qingni [1 ,2 ]
Wu, Zhonghai [1 ,2 ]
机构
[1] Peking Univ, Sch Software & Microelect, Beijing, Peoples R China
[2] Peking Univ, Natl Engn Res Ctr Software Engn, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Attribute-set based encryption; Composite attribute; Large universe; Selective security;
D O I
10.1007/978-3-319-89500-0_16
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attribute-set based encryption is a promising branch of attribute-based encryption which deals with the case when many attributes are only meaningful in groups or in sets and helps to avoid the exponential growth of attributes. We propose a feasible and efficient attribute-set based encryption scheme which is large universe, unbounded and supports composite attributes, using linear secret sharing schemes as the underlying tool. Additionally, our construction has been proved to be selectively secure in the standard model while previous ones could only be proved to be secure in the generic group model.
引用
收藏
页码:180 / 191
页数:12
相关论文
共 50 条
  • [31] Secure Efficient Revocable Large Universe Multi-Authority Attribute-Based Encryption for Cloud-Aided IoT
    Huang, Kaiqing
    IEEE ACCESS, 2021, 9 : 53576 - 53588
  • [32] Accountable and Revocable Large Universe Decentralized Multi-Authority Attribute-Based Encryption for Cloud-Aided IoT
    Huang, Kaiqing
    IEEE ACCESS, 2021, 9 : 123786 - 123804
  • [33] Lattice-Based HRA-secure Attribute-Based Proxy Re-Encryption in Standard Model
    Susilo, Willy
    Dutta, Priyanka
    Duong, Dung Hoang
    Roy, Partha Sarathi
    COMPUTER SECURITY - ESORICS 2021, PT II, 2021, 12973 : 169 - 191
  • [34] A Practical Deployment Framework for Use of Attribute-Based Encryption in Data Protection
    Xu, Zhiqian
    Martin, Keith M.
    2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, : 1593 - 1598
  • [35] Rough set model based on variable universe
    Kong, Qingzhao
    Chang, Xueer
    CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2022, 7 (03) : 503 - 511
  • [36] Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions
    Phuong, Tran Viet Xuan
    Yang, Guomin
    Susilo, Willy
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (01) : 35 - 45
  • [37] Attribute-based proxy re-encryption from standard lattices
    Luo, Fucai
    Al-Kuwari, Saif
    Wang, Fuqun
    Chen, Kefei
    Theoretical Computer Science, 2021, 865 : 52 - 62
  • [38] Attribute-based proxy re-encryption from standard lattices
    Luo, Fucai
    Al-Kuwari, Saif
    Wang, Fuqun
    Chen, Kefei
    THEORETICAL COMPUTER SCIENCE, 2021, 865 : 52 - 62
  • [39] Oblivious Transfer with Fine Grained Access Control from Ciphertext Policy Attribute Based Encryption in the Standard Model
    Fu, Xingbing
    Li, Fagen
    Zeng, Shengke
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (01): : 285 - 302
  • [40] Hidden Attribute Certificate-based Encryption Extensions Model
    Li Yu
    Zhao Yong
    Gong Bei
    Xin Si-Yuan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 469 - 474