Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost

被引:0
|
作者
Chen, Cheng [1 ]
Zhang, Zhenfeng [1 ]
Feng, Dengguo [1 ]
机构
[1] Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100190, Peoples R China
来源
PROVABLE SECURITY | 2011年 / 6980卷
关键词
Attribute-based encryption; chosen ciphertext security; efficiency; FUNCTIONAL ENCRYPTION; SECURITY; PKE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attribute-based encryption provides good solutions to the problem of anonymous access control by specifying access policies among private keys or ciphertexts over encrypted data. In ciphertext-policy attribute-based encryption (CP-ABE), each user is associated with a set of attributes, and data is encrypted with access structures on attributes. A user is able to decrypt a ciphertext if and only if his attributes satisfy the ciphertext access structure. CF-ABE is very appealing since the ciphertext and data access policies are integrated together in a natural and effective way. Most current CF-ABE schemes incur large ciphertext size and computation costs in the encryption and decryption operations which depend at least linearly on the number of attributes involved in the access policy. In this paper, we present two new CF-ABE schemes, which have both constant-size ciphertext and constant computation costs for a non-monotone AND gate access policy, under chosen plaintext and chosen ciphertext attacks. The security of first scheme can be proven CPA-secure in standard model under the decision n-BDHE assumption. And the security of second scheme can be proven CCA-secure in standard model under the decision n-BDHE assumption and the existence of collision-resistant hash functions. Our scheme can also be extended to the decentralizing multi-authority setting.
引用
收藏
页码:84 / 101
页数:18
相关论文
共 50 条
  • [11] Efficient Hidden Vector Encryption with Constant-Size Ciphertext
    Tran Viet Xuan Phuong
    Yang, Guomin
    Susilo, Willy
    [J]. COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 472 - 487
  • [12] Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption
    Doshi, Nishant
    Jinwala, Devesh C.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1988 - 2002
  • [13] An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
    Wang, Changji
    Luo, Jianfa
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [14] Expressive Attribute Based Signcryption with Constant-Size Ciphertext
    Rao, Y. Sreenivasa
    Dutta, Ratna
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 398 - 419
  • [15] Efficient dynamic threshold identity-based encryption with constant-size ciphertext
    Susilo, Willy
    Guo, Fuchun
    Mu, Yi
    [J]. THEORETICAL COMPUTER SCIENCE, 2016, 609 : 49 - 59
  • [16] Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsorced Verifiable Computation
    Zhang, Kai
    Gong, Junqing
    Tang, Shaohua
    Chen, Jie
    Li, Xiangxue
    Qian, Haifeng
    Cao, Zhenfu
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 269 - 279
  • [17] Privacy-preserving fully anonymous ciphertext policy attribute-based broadcast encryption with constant-size secret keys and fast decryption
    Mandal, Mriganka
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
  • [18] Traceable Ciphertext-policy Attribute-based Encryption Scheme with Constant Decryption Costs
    Wang Jianhua
    Wang Guangbo
    Xu Yang
    Hu Yixiao
    Zhang Yue
    Fan Liwen
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (04) : 802 - 810
  • [19] Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key
    Li, Jiguo
    Hu, Shengzhou
    Zhang, Yichen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [20] Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length
    Li, Jiguo
    Sha, Fengjie
    Zhang, Yichen
    Huang, Xinyi
    Shen, Jian
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,