Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption

被引:0
|
作者
Anada, Hiroaki [1 ]
Arita, Seiko [2 ]
机构
[1] Univ Nagasaki, Dept Informat Secur, Nagasaki, Japan
[2] Inst Informat Secur, Grad Sch Informat Secur, Yokohama, Kanagawa, Japan
基金
日本学术振兴会;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We propose a technique of individually modifying an attribute-based encryption scheme (ABE) secure against chosen-plaintext attacks (CPA) into an ABE scheme secure against chosen-ciphertext attacks (CCA) in the standard model. We demonstrate the technique in the case of the Waters ciphertext-policy ABE (CP-ABE). Our technique is helpful when a Diffie-Hellman tuple to be verified is in the terminal group of a bilinear map. We utilize the Twin Diffie-Hellman Trapdoor Test of Cash, Kiltz and Shoup, and it results in expansion of secret key length and decryption cost of computation by a factor of four, whereas public key length, ciphertext length and encryption cost of computation remain almost the same. In the case that the size of attribute sets are small, those lengths and costs are smaller than those of the CP-ABE obtained via the generic transformation of Yamada et al. in PKC 2011.
引用
收藏
页码:423 / 428
页数:6
相关论文
共 50 条
  • [31] ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    [J]. BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, 2009, 46 (04) : 803 - 819
  • [32] Ciphertext-policy attribute-based encryption scheme with verifiability on authority
    Yu J.
    He X.
    Yan X.
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (04): : 49 - 57
  • [33] Ciphertext-Policy Attribute-Based Encryption with Hiding Access Structure
    Yadav, Umesh Chandra
    [J]. 2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 23 - 27
  • [34] Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption
    Li, Qi
    Ma, Jianfeng
    Li, Rui
    Xiong, Jinbo
    Liu, Ximeng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4098 - 4109
  • [35] Novel Constructions for Ciphertext-Policy Attribute-Based Searchable Encryption
    Brigitthe Hinojosa-Cabello, Melissa
    Morales-Sandoval, Miguel
    Marin-Castro, Heidy M.
    [J]. 2022 IEEE MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE (ENC), 2022,
  • [36] An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme with Policy Update
    Wang, Changji
    Yuan, Yuan
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (02): : 1031 - 1041
  • [37] A Fully Secure Ciphertext-Policy Attribute-Based Encryption With a Tree-Based Access Structure
    Rifki, Sadikin
    Park, YoungHo
    Moon, SangJae
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2015, 31 (01) : 247 - 265
  • [38] Security analysis for a ciphertext-policy attribute-based encryption scheme
    Zeng, Fugeng
    Xu, Chunxiang
    Zhang, Xinpeng
    [J]. Advances in Information Sciences and Service Sciences, 2012, 4 (12): : 201 - 207
  • [39] An Efficient Ciphertext-policy Attribute-based Encryption on Ideal Lattices
    Zhao Jian
    Gao Haiying
    Hu Bin
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (07) : 1652 - 1660
  • [40] Efficient ciphertext-policy attribute-based encryption with blackbox traceability
    Xu, Shengmin
    Yuan, Jiaming
    Xu, Guowen
    Li, Yingjiu
    Liu, Ximeng
    Zhang, Yinghui
    Ying, Zuobin
    [J]. INFORMATION SCIENCES, 2020, 538 : 19 - 38