Fine-Grained Secure Attribute-Based Encryption

被引:11
|
作者
Wang, Yuyu [1 ]
Pan, Jiaxin [2 ]
Chen, Yu [3 ,4 ,5 ]
机构
[1] Univ Elect Sci & Technol China, Chengdu, Peoples R China
[2] NTNU Norwegian Univ Sci & Technol, Dept Math Sci, Trondheim, Norway
[3] Shandong Univ, Sch Cyber Sci & Technol, Qingdao 266237, Peoples R China
[4] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[5] Shandong Univ, Key Lab Cryptol Technol & Informat Secur, Minist Educ, Qingdao 266237, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Fine-grained cryptography; Identity-based encryption; Attribute-based encryption; Quasi-adaptive non-interactive zero-knowledge proof; IDENTITY-BASED ENCRYPTION; DUAL SYSTEM ENCRYPTION; HIBE; IBE;
D O I
10.1007/978-3-030-84259-8_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fine-grained cryptography is constructing cryptosystems in a setting where an adversary's resource is a-prior bounded and an honest party has less resource than an adversary. Currently, only simple form of encryption schemes, such as secret-key and public-key encryption, are constructed in this setting. In this paper, we enrich the available tools in fine-grained cryptography by proposing the first fine-grained secure attribute-based encryption (ABE) scheme. Our construction is adaptively secure under the widely accepted worst-case assumption, NC1 not subset of circle plus L/poly, and it is presented in a generic manner using the notion of predicate encodings (Wee, TCC'14). By properly instantiating the underlying encoding, we can obtain different types of ABE schemes, including identity-based encryption. Previously, all of these schemes were unknown in fine-grained cryptography. Our main technical contribution is constructing ABE schemes without using pairing or the Diffie-Hellman assumption. Hence, our results show that, even if one-way functions do not exist, we still have ABE schemes with meaningful security. For more application of our techniques, we construct an efficient (quasi-adaptive) non-interactive zero-knowledge (QANIZK) proof system.
引用
收藏
页码:179 / 207
页数:29
相关论文
共 50 条
  • [31] Fully secure revocable attribute-based encryption
    Qian J.-L.
    Dong X.-L.
    [J]. Journal of Shanghai Jiaotong University (Science), 2011, 16 (4) : 490 - 496
  • [32] Fully Secure Revocable Attribute-Based Encryption
    钱俊磊
    董晓蕾
    [J]. Journal of Shanghai Jiaotong University(Science), 2011, 16 (04) : 490 - 496
  • [33] Fine-grained Encryption for Secure Research Data Sharing
    Reis, Lucio H. A.
    de Oliveira, Marcela T.
    Olabarriaga, Silvia D.
    [J]. 2022 IEEE 35TH INTERNATIONAL SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS (CBMS), 2022, : 465 - 470
  • [34] Fine-Grained Attribute-Based Multikeyword Search for Shared Multiowner in Internet of Things
    Zhou, Yunhong
    Nan, Jiehui
    Wang, Licheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [35] A fine-grained attribute-based authentication for sensitive data stored in cloud computing
    Liu, Zhusong
    Luo, Jinman
    Xu, Lingling
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2016, 7 (04) : 237 - 244
  • [36] A Novel Attribute-based Access Control System for Fine-Grained Privacy Protection
    Son, Ha Xuan
    Nguyen Minh Hoang
    [J]. PROCEEDINGS OF 2019 THE 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP 2019) WITH WORKSHOP 2019 THE 4TH INTERNATIONAL CONFERENCE ON MULTIMEDIA AND IMAGE PROCESSING (ICMIP 2019), 2019, : 76 - 80
  • [37] Adaptively Secure Attribute-Based Encryption Supporting Attribute Revocation
    Wu Qiuxin
    Zhang Miao
    [J]. CHINA COMMUNICATIONS, 2012, 9 (09) : 22 - 40
  • [38] Designing quantum-secure attribute-based encryption
    Rao, Y. Sreenivasa
    Srivastava, Vikas
    Mohanty, Tapaswini
    Debnath, Sumit Kumar
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (09): : 13075 - 13091
  • [39] Secure and Efficient Attribute-Based Encryption with Keyword Search
    Wang, Haijiang
    Dong, Xiaolei
    Cao, Zhenfu
    Li, Dongmei
    [J]. COMPUTER JOURNAL, 2018, 61 (08): : 1133 - 1142
  • [40] Attribute-based fine-grained access control for outscored private set intersection computation
    Ali, Mohammad
    Mohajeri, Javad
    Sadeghi, Mohammad-Reza
    Liu, Ximeng
    [J]. INFORMATION SCIENCES, 2020, 536 : 222 - 243