Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions

被引:127
|
作者
Phuong, Tran Viet Xuan [1 ]
Yang, Guomin [1 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Ctr Comp & Informat Secur Res, Wollongong, NSW 2500, Australia
关键词
Attribute based encryption; hidden policy; inner product encryption; Viete's formula;
D O I
10.1109/TIFS.2015.2475723
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose two new ciphertext policy attribute-based encryption (CP-ABE) schemes where the access policy is defined by AND-gate with wildcard. In the first scheme, we present a new technique that uses only one group element to represent an attribute, while the existing ABE schemes of the same type need to use three different group elements to represent an attribute for the three possible values (namely, positive, negative, and wildcard). Our new technique leads to a new CP-ABE scheme with constant ciphertext size, which, however, cannot hide the access policy used for encryption. The main contribution of this paper is to propose a new CP-ABE scheme with the property of hidden access policy by extending the technique we used in the construction of our first scheme. In particular, we show a way to bridge ABE based on AND-gate with wildcard with inner product encryption and then use the latter to achieve the goal of hidden access policy. We prove that our second scheme is secure under the standard decisional linear and decisional bilinear Diffie-Hellman assumptions.
引用
收藏
页码:35 / 45
页数:11
相关论文
共 50 条
  • [1] Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption
    Kim, Intae
    Susilo, Willy
    Baek, Joonsang
    Kim, Jongkil
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1856 - 1870
  • [2] Lattice ciphertext policy attribute-based encryption in the standard model
    Wang, Yongtao
    International Journal of Network Security, 2014, 16 (06) : 444 - 451
  • [3] Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
    Li, Jiguo
    Wang, Haiping
    Zhang, Yichen
    Shen, Jian
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 3339 - 3352
  • [4] Outsourced ciphertext-policy attribute-based encryption with partial policy hidden
    Yu, Jinxia
    He, Guanghui
    Yan, Xixi
    Tang, Yongli
    Qin, Rongxia
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (05)
  • [5] Attribute-based encryption for ciphertext in advanced encryption standard
    Raja, M.
    Dhanasekaran, S.
    Vasudevan, V.
    MATERIALS TODAY-PROCEEDINGS, 2021, 37 : 3442 - 3445
  • [6] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [7] Attribute-Based Encryption with Partially Hidden Ciphertext Policies
    Nishide, Takashi
    Yoneyama, Kazuki
    Ohta, Kazuo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (01) : 22 - 32
  • [8] Analysis of Ciphertext Policy Hidden Attribute-Based Encryption and Its Improved Method
    Hu, Gongcheng
    Zhang, Leyou
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 193 - 208
  • [9] Ciphertext Policy-Hiding Attribute-Based Encryption
    Yadav, Umesh Chandra
    Ali, Syed Taqi
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 2067 - 2071
  • [10] Ciphertext Policy Attribute-Based Encryption from Lattices
    Zhang, Jiang
    Zhang, Zhenfeng
    Ge, Aijun
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,