Hierarchical Authority Key-Policy Attribute-Based Encryption

被引:0
|
作者
You, Lin [1 ]
Wang, Lijun [1 ]
机构
[1] Hangzhou Dianzi Univ, Hangzhou 310018, Zhejiang, Peoples R China
关键词
Attribute-based encryption; Hierarchical authority; Key-policy;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Based on the key-policy attribute-based encryption (KP-ABE), combined with the idea of hierarchical ID-Based encryption (HIBE), a hierarchical authority key-policy attribute-based encryption (HA-KP-ABE) scheme is presented. The new scheme uses hierarchical multi-authority to distribute private keys to users. It can not only relieve the burden with a single authority but also avoid the potential safety hazard when the central authority (CA) is untrusted or attacked. Moreover, private keys are computed for users according to random polynomials, different users can not collude. Access tree is used in the phase of key generation and different users' attribute sets are allowed to overlap, achieving fme-grained access control. Its security can be reduced to the decisional modified bilinear Diffie-Hellman (MBDH) assumption.
引用
收藏
页码:868 / 872
页数:5
相关论文
共 50 条
  • [1] Key-Policy Multi-authority Attribute-Based Encryption
    Longo, Riccardo
    Marcolla, Chiara
    Sala, Massimiliano
    [J]. ALGEBRAIC INFORMATICS (CAI 2015), 2015, 9270 : 152 - 164
  • [2] A Key-Policy Attribute-Based Broadcast Encryption
    Sun, Jin
    Hu, Yupu
    Zhang, Leyou
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (05) : 444 - 452
  • [3] Hierarchical and non-monotonic key-policy attribute-based encryption and its application
    Li, Cong
    Shen, Qingni
    Xie, Zhikang
    Dong, Jisheng
    Feng, Xinyu
    Fang, Yuejian
    Wu, Zhonghai
    [J]. INFORMATION SCIENCES, 2022, 611 : 591 - 627
  • [4] Large universe decentralized key-policy attribute-based encryption
    Li, Qi
    Ma, Jianfeng
    Li, Rui
    Xiong, Jinbo
    Liu, Ximeng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (03) : 501 - 509
  • [5] Adaptable key-policy attribute-based encryption with time interval
    Siqi Ma
    Junzuo Lai
    Robert H. Deng
    Xuhua Ding
    [J]. Soft Computing, 2017, 21 : 6191 - 6200
  • [6] Key-Policy Attribute-Based Encryption from Bilinear Maps
    Tiplea, Ferucio Laurentiu
    Dragan, Constantin Catalin
    Nica, Anca-Maria
    [J]. INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATION: 10TH INTERNATIONAL CONFERENCE, SECITC 2017, 2017, 10543 : 28 - 42
  • [7] KEY-POLICY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR GENERAL CIRCUITS
    Bolocan, Diana
    [J]. PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2020, 21 (01): : 11 - 19
  • [8] Adaptable key-policy attribute-based encryption with time interval
    Ma, Siqi
    Lai, Junzuo
    Deng, Robert H.
    Ding, Xuhua
    [J]. SOFT COMPUTING, 2017, 21 (20) : 6191 - 6200
  • [9] Accountable authority key policy attribute-based encryption
    WANG YongTao 1
    2 China Information Technology Security Evaluation Center
    3 Shanghai Key Laboratory of Scalable Computing and Systems
    4 State Key Laboratory of Information Security
    [J]. Science China(Information Sciences), 2012, 55 (07) : 1631 - 1638
  • [10] Accountable authority key policy attribute-based encryption
    Wang YongTao
    Chen KeFei
    Long Yu
    Liu ZhaoHui
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (07) : 1631 - 1638