Attribute-Based Encryption for Range Attributes

被引:6
|
作者
Attrapadung, Nuttapong [1 ]
Hanaoka, Goichiro [1 ]
Ogawa, Kazuto [2 ]
Ohtake, Go [2 ]
Watanabe, Hajime [1 ]
Yamada, Shota [1 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Adv Cryptosyst Res Grp, Tokyo 1350064, Japan
[2] Japan Broadcasting Corp NHK, Sci & Technol Res Lab, Tokyo 1578510, Japan
关键词
attribute-based encryption; range attribute; generic construction; FUNCTIONAL ENCRYPTION; CIPHERTEXTS;
D O I
10.1587/transfun.E101.A.1440
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-Based Encryption (ABE) is an advanced form of public-key encryption where access control mechanisms based on attributes and policies are possible. In conventional ABE, attributes are specified as strings. However, there are certain applications where it is useful to specify attributes as numerical values and consider a predicate that determines if a certain numerical range would include a certain value. Examples of these types of attributes include time, position coordinate, person's age, rank, identity, and so on. In this paper, we introduce ABE for boolean formulae over Range Membership (ABE-RM). We show generic methods to convert conventional ABE to ABE-RM. Our generic conversions are efficient as they introduce only logarithmic overheads (in key and ciphertext sizes), as opposed to trivial methods, which would pose linear overheads. By applying our conversion to previous ABE schemes, we obtain new efficient and expressive ABE-RM schemes. Previous works that considered ABE with range attributes are specific and can only deal with either a single relation of range membership (Paterson and Quaglia at SCN' 10, and Kasamatsu et al. at SCN' 12), or limited classes of policies, namely, only AND-gates of range attributes (Shi et al. at IEEE S&P'07, and some subsequent work). Our schemes are generic and can deal with expressive boolean formulae.
引用
收藏
页码:1440 / 1455
页数:16
相关论文
共 50 条
  • [1] Attribute-Based Encryption for Range Attributes
    Attrapadung, Nuttapong
    Hanaoka, Goichiro
    Ogawa, Kazuto
    Ohtake, Go
    Watanabe, Hajime
    Yamada, Shota
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016, 2016, 9841 : 42 - 61
  • [2] Efficient attribute-based encryption with repeated attributes optimization
    Fawad Khan
    Hui Li
    Yinghui Zhang
    Haider Abbas
    Tahreem Yaqoob
    [J]. International Journal of Information Security, 2021, 20 : 431 - 444
  • [3] Efficient attribute-based encryption with repeated attributes optimization
    Khan, Fawad
    Li, Hui
    Zhang, Yinghui
    Abbas, Haider
    Yaqoob, Tahreem
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (03) : 431 - 444
  • [4] Attribute-based encryption
    Sahai, Amit
    Waters, Brent
    Lu, Steve
    [J]. Cryptology and Information Security Series, 2009, 2 : 156 - 168
  • [5] Attribute-Based Encryption for Circuits
    Gorbunov, Sergey
    Vaikuntanathan, Vinod
    Wee, Hoeteck
    [J]. STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2013, : 545 - 554
  • [6] Decentralizing Attribute-Based Encryption
    Lewko, Allison
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 568 - 588
  • [7] Registered Attribute-Based Encryption
    Hohenberger, Susan
    Lu, George
    Waters, Brent
    Wu, David J.
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT III, 2023, 14006 : 511 - 542
  • [8] Attribute-Based Encryption for Circuits
    Gorbunov, Sergey
    Vaikuntanathan, Vinod
    Wee, Hoeteck
    [J]. JOURNAL OF THE ACM, 2015, 62 (06)
  • [9] Distributed Attribute-Based Encryption
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 20 - 36
  • [10] Enhancing Attribute-Based Encryption with Attribute Hierarchy
    Li, Jin
    Wang, Qian
    Wang, Cong
    Ren, Kui
    [J]. MOBILE NETWORKS & APPLICATIONS, 2011, 16 (05): : 553 - 561