Attribute-Based Encryption with Fast Decryption

被引:0
|
作者
Hohenberger, Susan [1 ]
Waters, Brent [2 ]
机构
[1] Johns Hopkins Univ, Baltimore, MD 21218 USA
[2] Univ Texas Austin, Austin, TX 78712 USA
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) is a vision of public key encryption that allows users to encrypt and decrypt messages based on user attributes. This functionality comes at a cost. In a typical implementation, the size of the ciphertext is proportional to the number of attributes associated with it and the decryption time is proportional to the number of attributes used during decryption. Specifically, many practical ABE implementations require one pairing operation per attribute used during decryption. This work focuses on designing ABE schemes with fast decryption algorithms. We restrict our attention to expressive systems without system-wide bounds or limitations, such as placing a limit on the number of attributes used in a ciphertext or a private key. In this setting, we present the first key-policy ABE system where ciphertexts can be decrypted with a constant number of pairings. We show that GPSW ciphertexts can be decrypted with only 2 pairings by increasing the private key size by a factor of vertical bar Gamma vertical bar, where Gamma is the set of distinct attributes that appear in the private key. We then present a generalized construction that allows each system user to independently tune various efficiency tradeoffs to their liking on a spectrum where the extremes are GPSW on one end and our very fast scheme on the other. This tuning requires no changes to the public parameters or the encryption algorithm. Strategies for choosing an individualized user optimization plan are discussed. Finally, we discuss how these ideas can be translated into the ciphertext-policy ABE setting at a higher cost.
引用
收藏
页码:162 / 179
页数:18
相关论文
共 50 条
  • [21] Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing
    Qin, Baodong
    Zheng, Dong
    [J]. IEEE ACCESS, 2019, 7 : 42331 - 42342
  • [22] Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length
    Li, Jiguo
    Sha, Fengjie
    Zhang, Yichen
    Huang, Xinyi
    Shen, Jian
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [23] FAME: Fast Attribute-based Message Encryption
    Agrawal, Shashank
    Chase, Melissa
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 665 - 682
  • [24] Fast, compact, and expressive attribute-based encryption
    Junichi Tomida
    Yuto Kawahara
    Ryo Nishimaki
    [J]. Designs, Codes and Cryptography, 2021, 89 : 2577 - 2626
  • [25] Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption
    El Gafif, Hassan
    Toumanari, Ahmed
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [26] Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV
    Feng, Chaosheng
    Yu, Keping
    Aloqaily, Moayad
    Alazab, Mamoun
    Lv, Zhihan
    Mumtaz, Shahid
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (11) : 13784 - 13795
  • [27] Fast, compact, and expressive attribute-based encryption
    Tomida, Junichi
    Kawahara, Yuto
    Nishimaki, Ryo
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (11) : 2577 - 2626
  • [28] Traceable Ciphertet-Policy Attribute-Based Encryption with Constant Decryption
    Wang, Guangbo
    Li, Feng
    Wang, Pengcheng
    Hu, Yixiao
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (09): : 3401 - 3420
  • [29] Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Schemes with Fast Decryption
    Rao, Y. Sreenivasa
    [J]. INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 521 - 531
  • [30] A Multi-authority Attribute-based Encryption Scheme with Pre-decryption
    Chen, Danwei
    Wan, Liangqing
    Wang, Chen
    Pan, Su
    Ji, Yuting
    [J]. 2015 SEVENTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP), 2015, : 223 - 228