Attribute-Based Encryption for Range Attributes

被引:18
|
作者
Attrapadung, Nuttapong [1 ]
Hanaoka, Goichiro [1 ]
Ogawa, Kazuto [2 ]
Ohtake, Go [2 ]
Watanabe, Hajime [1 ]
Yamada, Shota [1 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Tokyo, Japan
[2] Japan Broadcasting Corp NHK, Tokyo, Japan
关键词
FUNCTIONAL ENCRYPTION; BROADCAST ENCRYPTION; CIPHERTEXTS; SECURITY;
D O I
10.1007/978-3-319-44618-9_3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attribute-Based Encryption (ABE) is an advanced form of public-key encryption where access control mechanisms based on attributes and policies are possible. In conventional ABE, attributes are specified as strings. However, there are certain applications where it is useful to specify attributes as numerical values and consider a predicate that determines if a certain numerical range would include a certain value. Examples of these types of attributes include time, position coordinate, person's age, rank, identity, and so on. In this paper, we introduce ABE for boolean formulae over Range Membership (ABE-RM). We show generic methods to convert conventional ABE to ABE-RM. Our generic conversions are efficient as they introduce only logarithmic overheads (in key and ciphertext sizes), as opposed to trivial methods, which would pose linear overheads. By applying our conversion to previous ABE schemes, we obtain new efficient and expressive ABE-RM schemes. Previous works that considered ABE with range attributes are specific and can only deal with either a single relation of range membership (Paterson and Quaglia at SCN 2010, and Kasamatsu et al. at SCN 2012), or limited classes of policies, namely, only AND-gates of range attributes (Shi et al. at IEEE S&P 2007, and some subsequent work). Our schemes are generic and can deal with expressive boolean formulae.
引用
收藏
页码:42 / 61
页数:20
相关论文
共 50 条
  • [1] Attribute-Based Encryption for Range Attributes
    Attrapadung, Nuttapong
    Hanaoka, Goichiro
    Ogawa, Kazuto
    Ohtake, Go
    Watanabe, Hajime
    Yamada, Shota
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09) : 1440 - 1455
  • [2] Efficient attribute-based encryption with repeated attributes optimization
    Fawad Khan
    Hui Li
    Yinghui Zhang
    Haider Abbas
    Tahreem Yaqoob
    [J]. International Journal of Information Security, 2021, 20 : 431 - 444
  • [3] Efficient attribute-based encryption with repeated attributes optimization
    Khan, Fawad
    Li, Hui
    Zhang, Yinghui
    Abbas, Haider
    Yaqoob, Tahreem
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (03) : 431 - 444
  • [4] Attribute-Based Encryption for Circuits
    Gorbunov, Sergey
    Vaikuntanathan, Vinod
    Wee, Hoeteck
    [J]. STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2013, : 545 - 554
  • [5] Registered Attribute-Based Encryption
    Hohenberger, Susan
    Lu, George
    Waters, Brent
    Wu, David J.
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT III, 2023, 14006 : 511 - 542
  • [6] Decentralizing Attribute-Based Encryption
    Lewko, Allison
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 568 - 588
  • [7] Attribute-Based Encryption for Circuits
    Gorbunov, Sergey
    Vaikuntanathan, Vinod
    Wee, Hoeteck
    [J]. JOURNAL OF THE ACM, 2015, 62 (06)
  • [8] Distributed Attribute-Based Encryption
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 20 - 36
  • [9] Enhancing Attribute-Based Encryption with Attribute Hierarchy
    Li, Jin
    Wang, Qian
    Wang, Cong
    Ren, Kui
    [J]. MOBILE NETWORKS & APPLICATIONS, 2011, 16 (05): : 553 - 561
  • [10] Enhancing Attribute-Based Encryption with Attribute Hierarchy
    Jin Li
    Qian Wang
    Cong Wang
    Kui Ren
    [J]. Mobile Networks and Applications, 2011, 16 : 553 - 561