Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption

被引:0
|
作者
Anada, Hiroaki [1 ]
Arita, Seiko [2 ]
机构
[1] Univ Nagasaki, Dept Informat Secur, Nagasaki, Japan
[2] Inst Informat Secur, Grad Sch Informat Secur, Yokohama, Kanagawa, Japan
基金
日本学术振兴会;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We propose a technique of individually modifying an attribute-based encryption scheme (ABE) secure against chosen-plaintext attacks (CPA) into an ABE scheme secure against chosen-ciphertext attacks (CCA) in the standard model. We demonstrate the technique in the case of the Waters ciphertext-policy ABE (CP-ABE). Our technique is helpful when a Diffie-Hellman tuple to be verified is in the terminal group of a bilinear map. We utilize the Twin Diffie-Hellman Trapdoor Test of Cash, Kiltz and Shoup, and it results in expansion of secret key length and decryption cost of computation by a factor of four, whereas public key length, ciphertext length and encryption cost of computation remain almost the same. In the case that the size of attribute sets are small, those lengths and costs are smaller than those of the CP-ABE obtained via the generic transformation of Yamada et al. in PKC 2011.
引用
收藏
页码:423 / 428
页数:6
相关论文
共 50 条
  • [1] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    Xu Peng
    Tang Yong
    Jiang Wenbin
    Jin Hai
    Zou Deqing
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 655 - 660
  • [2] Ciphertext-policy attribute-based encryption with short keys
    [J]. Jiang, Wenbin, 1600, Chinese Institute of Electronics (23):
  • [3] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    XU Peng
    TANG Yong
    JIANG Wenbin
    JIN Hai
    ZOU Deqing
    [J]. Chinese Journal of Electronics, 2014, 23 (04) : 655 - 660
  • [4] An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption
    Balu, A.
    Kuppusamy, K.
    [J]. INFORMATION SCIENCES, 2014, 276 : 354 - 362
  • [5] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [6] Adaptively secure outsourcing ciphertext-policy attribute-based encryption
    Wang, Hao
    Zheng, Zhihua
    Wu, Lei
    Wang, Yilei
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2270 - 2280
  • [7] Efficient and Fully Secure Forward Secure Ciphertext-Policy Attribute-Based Encryption
    Kitagawa, Takashi
    Kojima, Hiroki
    Attrapadung, Nuttapong
    Imai, Hideki
    [J]. INFORMATION SECURITY (ISC 2013), 2015, 7807 : 87 - 99
  • [8] Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
    Deng, Hua
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    Zhang, Lei
    Liu, Jianwei
    Shi, Wenchang
    [J]. INFORMATION SCIENCES, 2014, 275 : 370 - 384
  • [9] Ciphertext-policy attribute-based delay encryption
    Chen, Lijiao
    Lv, Kewei
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (02) : 167 - 185
  • [10] Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes
    Ibraimi, Luan
    Tang, Qiang
    Hartel, Pieter
    Jonker, Willem
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 1 - 12