Traceable Ciphertet-Policy Attribute-Based Encryption with Constant Decryption

被引:2
|
作者
Wang, Guangbo [1 ]
Li, Feng [1 ]
Wang, Pengcheng [1 ]
Hu, Yixiao [1 ]
机构
[1] Beijing Sci & Technol Informat Res Ctr, Beijing 100036, Peoples R China
关键词
ciphertext-policy; traceability; constant decryption; CP-ABE; SECRET KEYS; DEVICES;
D O I
10.3837/tiis.2021.09.017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We provide a traceable ciphertext-policy attribute based encryption (CP-ABE) construction for monotone access structures (MAS) based on composite order bilinear groups, which is secure adaptively under the standard model. We construct this scheme by making use of an "encoding technique" which represents the MAS by their minimal sets to encrypt the messages. To date, for all traceable CP-ABE schemes, their encryption costs grow linearly with the MAS size, the decryption costs grow linearly with the qualified rows in the span programs. However, in our traceable CP-ABE, the ciphertext is linear with the minimal sets, and decryption needs merely three bilinear pairing computations and two exponent computations, which improves the efficiency extremely and has constant decryption. At last, the detailed security and traceability proof is given.
引用
收藏
页码:3401 / 3420
页数:20
相关论文
共 50 条
  • [1] Traceable Ciphertext-policy Attribute-based Encryption Scheme with Constant Decryption Costs
    Wang Jianhua
    Wang Guangbo
    Xu Yang
    Hu Yixiao
    Zhang Yue
    Fan Liwen
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (04) : 802 - 810
  • [2] Traceable Multiauthority Attribute-Based Encryption with Outsourced Decryption and Hidden Policy for CIoT
    Liu, Suhui
    Yu, Jiguo
    Hu, Chunqiang
    Li, Mengmeng
    [J]. Wireless Communications and Mobile Computing, 2021, 2021
  • [3] Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud
    Li, Qi
    Zhu, Hongbo
    Ying, Zuobin
    Zhang, Tao
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [4] Attribute-Based Encryption with Fast Decryption
    Hohenberger, Susan
    Waters, Brent
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 162 - 179
  • [5] Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Yiu, S. M.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 108 : 112 - 123
  • [6] Multiauthority Attribute-Based Encryption with Traceable and Dynamic Policy Updating
    Ling, Jie
    Chen, Junwei
    Chen, Jiahui
    Gan, Wensheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [7] Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption
    Doshi, Nishant
    Jinwala, Devesh C.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1988 - 2002
  • [8] Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length
    Li, Jiguo
    Sha, Fengjie
    Zhang, Yichen
    Huang, Xinyi
    Shen, Jian
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [9] White-Box Traceable Attribute-Based Encryption with Hidden Policies and Outsourced Decryption
    Ziegler, Dominik
    Marsalek, Alexander
    Palfinger, Gerald
    [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 331 - 338
  • [10] Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation
    Gao, Jiaxin
    Sun, Jiameng
    Qin, Jing
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2160 - 2169