Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts

被引:0
|
作者
Attrapadung, Nuttapong [1 ]
Libert, Benoit [2 ]
de Panafieu, Elie [3 ]
机构
[1] AIST, Res Ctr Informat Secur, Tsukuba, Ibaraki, Japan
[2] Catholic Univ Louvain, ICTEAM, Crypto Grp, Louvain, Belgium
[3] Ecole Normale Super, Cachan, France
来源
关键词
Attribute-based encryption; expressivity; efficiency; IDENTITY-BASED ENCRYPTION; FUNCTIONAL ENCRYPTION; BROADCAST ENCRYPTION; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE), as introduced by Sahai and Waters, allows for fine-grained access control on encrypted data. In its key-policy flavor, the primitive enables senders to encrypt messages under a set of attributes and private keys are associated with access structures that specify which ciphertexts the key holder will be allowed to decrypt. In most ABE systems, the ciphertext size grows linearly with the number of ciphertext attributes and the only known exceptions only support restricted forms of threshold access policies. This paper proposes the first key-policy attribute-based encryption (KP-ABE) schemes allowing for non-monotonic access structures (i.e., that may contain negated attributes) and with constant ciphertext size. Towards achieving this goal, we first show that a certain class of identity-based broadcast encryption schemes generically yields monotonic KP-ABE systems in the selective set model. We then describe a new efficient identity-based revocation mechanism that, when combined with a particular instantiation of our general monotonic construction, gives rise to the first truly expressive KP-ABE realization with constant-size ciphertexts. The downside of these new constructions is that private keys have quadratic size in the number of attributes. On the other hand, they reduce the number of pairing evaluations to a constant, which appears to be a unique feature among expressive KP-ABE schemes.
引用
收藏
页码:90 / +
页数:4
相关论文
共 50 条
  • [1] Expressive Key-policy Attribute-based Constant-size Signature
    Rani, Shikha
    Ali, Syed Taqi
    [J]. 2017 ISEA ASIA SECURITY AND PRIVACY CONFERENCE (ISEASP 2017), 2017, : 101 - 104
  • [2] Attribute-based encryption schemes with constant-size ciphertexts
    Attrapadung, Nuttapong
    Herranz, Javier
    Laguillaumie, Fabien
    Libert, Benoit
    de Panafieu, Elie
    Rafols, Carla
    [J]. THEORETICAL COMPUTER SCIENCE, 2012, 422 : 15 - 38
  • [3] Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption
    Takashima, Katsuyuki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 74 - 106
  • [4] A Key-policy Attribute-based Encryption Scheme with Constant Size Ciphertext
    Wang, Chang-Ji
    Luo, Jian-Fa
    [J]. PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 447 - 451
  • [5] Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
    Zhang, Yinghui
    Zheng, Dong
    Chen, Xiaofeng
    Li, Jin
    Li, Hui
    [J]. PROVABLE SECURITY, PROVSEC 2014, 2014, 8782 : 259 - 273
  • [6] Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
    Susilo, Willy
    Yang, Guomin
    Guo, Fuchun
    Huang, Qiong
    [J]. INFORMATION SCIENCES, 2018, 429 : 349 - 360
  • [7] Attribute-based encryption with constant size ciphertexts
    Chen, Shao-Zhen
    Wang, Hai-Bin
    [J]. Tongxin Xuebao/Journal on Communications, 2011, 32 (11 A): : 190 - 195
  • [8] Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsorced Verifiable Computation
    Zhang, Kai
    Gong, Junqing
    Tang, Shaohua
    Chen, Jie
    Li, Xiangxue
    Qian, Haifeng
    Cao, Zhenfu
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 269 - 279
  • [9] A Key-Policy Attribute-Based Broadcast Encryption
    Sun, Jin
    Hu, Yupu
    Zhang, Leyou
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (05) : 444 - 452
  • [10] Constant Size Ciphertexts in Threshold Attribute-Based Encryption
    Herranz, Javier
    Laguillaumie, Fabien
    Rafols, Carla
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS, 2010, 6056 : 19 - +