Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost

被引:0
|
作者
Chen, Cheng [1 ]
Zhang, Zhenfeng [1 ]
Feng, Dengguo [1 ]
机构
[1] Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100190, Peoples R China
来源
PROVABLE SECURITY | 2011年 / 6980卷
关键词
Attribute-based encryption; chosen ciphertext security; efficiency; FUNCTIONAL ENCRYPTION; SECURITY; PKE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attribute-based encryption provides good solutions to the problem of anonymous access control by specifying access policies among private keys or ciphertexts over encrypted data. In ciphertext-policy attribute-based encryption (CP-ABE), each user is associated with a set of attributes, and data is encrypted with access structures on attributes. A user is able to decrypt a ciphertext if and only if his attributes satisfy the ciphertext access structure. CF-ABE is very appealing since the ciphertext and data access policies are integrated together in a natural and effective way. Most current CF-ABE schemes incur large ciphertext size and computation costs in the encryption and decryption operations which depend at least linearly on the number of attributes involved in the access policy. In this paper, we present two new CF-ABE schemes, which have both constant-size ciphertext and constant computation costs for a non-monotone AND gate access policy, under chosen plaintext and chosen ciphertext attacks. The security of first scheme can be proven CPA-secure in standard model under the decision n-BDHE assumption. And the security of second scheme can be proven CCA-secure in standard model under the decision n-BDHE assumption and the existence of collision-resistant hash functions. Our scheme can also be extended to the decentralizing multi-authority setting.
引用
收藏
页码:84 / 101
页数:18
相关论文
共 50 条
  • [1] Direct Revocable Ciphertext Policy Attribute-Based Encryption Scheme with Constant-Size Ciphertext
    Zhu, Guo-Bin
    Xie, Xin
    Zhang, Xing
    Zhao, Yang
    Xiong, Hu
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2021, 50 (01): : 76 - 83
  • [2] Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
    Zhang, Yinghui
    Zheng, Dong
    Chen, Xiaofeng
    Li, Jin
    Li, Hui
    [J]. PROVABLE SECURITY, PROVSEC 2014, 2014, 8782 : 259 - 273
  • [3] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
    Emura, Keita
    Miyaji, Atsuko
    Nomura, Akito
    Omote, Kazumasa
    Soshi, Masakazu
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 13 - +
  • [4] Expressive attribute-based keyword search with constant-size ciphertext
    Han, Jinguang
    Yang, Ye
    Liu, Joseph K.
    Li, Jiguo
    Liang, Kaitai
    Shen, Jian
    [J]. SOFT COMPUTING, 2018, 22 (15) : 5163 - 5177
  • [5] Expressive attribute-based keyword search with constant-size ciphertext
    Jinguang Han
    Ye Yang
    Joseph K. Liu
    Jiguo Li
    Kaitai Liang
    Jian Shen
    [J]. Soft Computing, 2018, 22 : 5163 - 5177
  • [6] Constant-Size Ciphertext Attribute-Based Encryption from Multi-channel Broadcast Encryption
    Canard, Sebastien
    Viet Cuong Trinh
    [J]. INFORMATION SYSTEMS SECURITY, 2016, 10063 : 193 - 211
  • [7] Efficient Multi-Authority Attribute-Based Signcryption with Constant-Size Ciphertext
    Zhao, Yang
    Ruan, Ankang
    Dan, Guohang
    Huang, Jicheng
    Ding, Yi
    [J]. 2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [8] A Key-policy Attribute-based Encryption Scheme with Constant Size Ciphertext
    Wang, Chang-Ji
    Luo, Jian-Fa
    [J]. PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 447 - 451
  • [9] Attribute-Based Access Control with Constant-Size Ciphertext in Cloud Computing
    Teng, Wei
    Yang, Geng
    Xiang, Yang
    Zhang, Ting
    Wang, Dongyang
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (04) : 617 - 627
  • [10] Expressive Ciphertext-policy Attribute-based Encryption Scheme with Fast Decryption and Constant-size Secret Keys
    Li Long
    Gu Tianlong
    Chang Liang
    Xu Zhoubo
    Qian Junyan
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (07) : 1661 - 1668