Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions

被引:127
|
作者
Phuong, Tran Viet Xuan [1 ]
Yang, Guomin [1 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Ctr Comp & Informat Secur Res, Wollongong, NSW 2500, Australia
关键词
Attribute based encryption; hidden policy; inner product encryption; Viete's formula;
D O I
10.1109/TIFS.2015.2475723
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose two new ciphertext policy attribute-based encryption (CP-ABE) schemes where the access policy is defined by AND-gate with wildcard. In the first scheme, we present a new technique that uses only one group element to represent an attribute, while the existing ABE schemes of the same type need to use three different group elements to represent an attribute for the three possible values (namely, positive, negative, and wildcard). Our new technique leads to a new CP-ABE scheme with constant ciphertext size, which, however, cannot hide the access policy used for encryption. The main contribution of this paper is to propose a new CP-ABE scheme with the property of hidden access policy by extending the technique we used in the construction of our first scheme. In particular, we show a way to bridge ABE based on AND-gate with wildcard with inner product encryption and then use the latter to achieve the goal of hidden access policy. We prove that our second scheme is secure under the standard decisional linear and decisional bilinear Diffie-Hellman assumptions.
引用
收藏
页码:35 / 45
页数:11
相关论文
共 50 条
  • [21] Removing escrow from ciphertext policy attribute-based encryption
    Hur, Junbeom
    Koo, Dongyoung
    Hwang, Seong Oun
    Kang, Kyungtae
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2013, 65 (09) : 1310 - 1317
  • [22] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    XU Peng
    TANG Yong
    JIANG Wenbin
    JIN Hai
    ZOU Deqing
    Chinese Journal of Electronics, 2014, 23 (04) : 655 - 660
  • [23] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    Xu Peng
    Tang Yong
    Jiang Wenbin
    Jin Hai
    Zou Deqing
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 655 - 660
  • [24] Ciphertext-policy attribute-based encryption with short keys
    Jiang, Wenbin, 1600, Chinese Institute of Electronics (23):
  • [25] Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System
    Zhang, Leyou
    Hu, Gongcheng
    Mu, Yi
    Rezaeibagha, Fatemeh
    IEEE ACCESS, 2019, 7 : 33202 - 33213
  • [26] Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption
    Feng, Xinyu
    Li, Cong
    Li, Dan
    Fang, Yuejian
    Shen, Qingni
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 192 - 204
  • [27] Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    SENSORS, 2019, 19 (07)
  • [28] Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack
    Qiu, Shuo
    Liu, Jiqiang
    Shi, Yanfeng
    Zhang, Rui
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (05)
  • [29] An Expressive Fully Policy-Hidden Ciphertext Policy Attribute-Based Encryption Scheme With Credible Verification Based on Blockchain
    Zhang, Zhaoqian
    Zhang, Jianbiao
    Yuan, Yilin
    Li, Zheng
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) : 8681 - 8692
  • [30] Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack
    Shuo QIU
    Jiqiang LIU
    Yanfeng SHI
    Rui ZHANG
    Science China(Information Sciences), 2017, 60 (05) : 130 - 141