Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions

被引:127
|
作者
Phuong, Tran Viet Xuan [1 ]
Yang, Guomin [1 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Ctr Comp & Informat Secur Res, Wollongong, NSW 2500, Australia
关键词
Attribute based encryption; hidden policy; inner product encryption; Viete's formula;
D O I
10.1109/TIFS.2015.2475723
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose two new ciphertext policy attribute-based encryption (CP-ABE) schemes where the access policy is defined by AND-gate with wildcard. In the first scheme, we present a new technique that uses only one group element to represent an attribute, while the existing ABE schemes of the same type need to use three different group elements to represent an attribute for the three possible values (namely, positive, negative, and wildcard). Our new technique leads to a new CP-ABE scheme with constant ciphertext size, which, however, cannot hide the access policy used for encryption. The main contribution of this paper is to propose a new CP-ABE scheme with the property of hidden access policy by extending the technique we used in the construction of our first scheme. In particular, we show a way to bridge ABE based on AND-gate with wildcard with inner product encryption and then use the latter to achieve the goal of hidden access policy. We prove that our second scheme is secure under the standard decisional linear and decisional bilinear Diffie-Hellman assumptions.
引用
收藏
页码:35 / 45
页数:11
相关论文
共 50 条
  • [31] Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
    Deng, Shijie
    Yang, Gaobo
    Dong, Wen
    Xia, Ming
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (14) : 22251 - 22274
  • [32] Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
    Shijie Deng
    Gaobo Yang
    Wen Dong
    Ming Xia
    Multimedia Tools and Applications, 2023, 82 : 22251 - 22274
  • [33] A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update
    Liu, Zhe
    Wang, Fuqun
    Chen, Kefei
    Tang, Fei
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [34] An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme with Policy Update
    Wang, Changji
    Yuan, Yuan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (02): : 1031 - 1041
  • [35] Dynamic Ciphertext-Policy Attribute-Based Encryption for Expressive Access Policy
    Rao, Y. Sreenivasa
    Dutta, Ratna
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2014, 2014, 8337 : 275 - 286
  • [36] Outsourced Attribute-Based Encryption Scheme with Policy Updating and Verifiable Ciphertext
    Su, Zelin
    Zhang, Wenfang
    Wang, Xiaomin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (12): : 3088 - 3097
  • [37] Ciphertext-policy attribute-based encryption scheme with verifiability on authority
    Yu J.
    He X.
    Yan X.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (04): : 49 - 57
  • [38] ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, 2009, 46 (04) : 803 - 819
  • [39] Online/offline ciphertext-policy attribute-based searchable encryption
    Chen D.
    Cao Z.
    Dong X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (10): : 2365 - 2375
  • [40] An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures
    Cui, Hui
    Deng, Robert H.
    Wu, Guowei
    Lai, Junzuo
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 19 - 38