Cipher Text Policy Attribute Based Broadcast Encryption for Multi-Privileged Groups

被引:0
|
作者
Angamuthu, Muthulakshmi [1 ]
Mani, Akshaya [2 ]
Ramalingam, Anitha [3 ]
机构
[1] PSG Coll Technol, Dept Math, Coimbatore, Tamil Nadu, India
[2] Georgetown Univ, Dept Comp Sci, Washington, DC 20057 USA
[3] PSG Coll Technol, Dept Appl Math & Computat Sci, Coimbatore, Tamil Nadu, India
关键词
Attribute based broadcast encryption; decisional bilinear diffie hellman problem and decisional diffie hellman problem; multi-privileged groups; cipher text policy; SCHEME; EFFICIENT;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the current globalization scenario, many group communication applications have become vital and the users not only subscribe to a single resource, but they use multiple resources and hence ending up with multi-privileged groups. In some group communication applications, it is desirable to encrypt the contents without exact knowledge of the set of intended receivers. Attribute based encryption offers this ability and enforces access policies defined on attributes, within the encryption process. In these schemes, the encryption keys and/or cipher texts are labelled with sets of descriptive attributes defined for the system users, and a particular user private key can decrypt only if the two match. This paper presents a cipher text policy attribute based broadcast encryption scheme for multi-privileged group of users. The proposed scheme has been proved secure using random oracle model.
引用
收藏
页码:313 / 320
页数:8
相关论文
共 50 条
  • [11] Hidden Hierarchy Based on Cipher-Text Attribute Encryption for IoT Data Privacy in Cloud
    Ibrahim, Zaid Abdulsalam
    Ilyas, Muhammad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 76 (01): : 939 - 956
  • [12] Permanent Revocation in Attribute Based Broadcast Encryption
    Dolev, Shlomi
    Gilboa, Niv
    Kopeetsky, Marina
    2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 203 - 208
  • [13] Conjunctive Broadcast and Attribute-Based Encryption
    Attrapadung, Nuttapong
    Imai, Hideki
    PAIRING-BASED CRYPTOGRAPHY - PAIRING 2009, 2009, 5671 : 248 - 265
  • [14] Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption
    Zhou, Zhibin
    Huang, Dijiang
    Wang, Zhijie
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (01) : 126 - 138
  • [15] A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption
    Canard, S.
    Phan, D. H.
    Pointcheval, D.
    Trinh, V. C.
    THEORETICAL COMPUTER SCIENCE, 2018, 723 : 51 - 72
  • [16] Flexible Identity based Attribute Encryption from Identity based Broadcast Encryption
    Sakai, Ryuichi
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 342 - 345
  • [17] Broadcast Encryption Based on Braid Groups
    Saguansakdiyotin, Norranut
    Hiranvanichakorn, Pipat
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (02): : 12 - 19
  • [18] Proof of Cipher Text Ownership based on Convergence Encryption
    Zhong, Weiwei
    Liu, Zhusong
    GREEN ENERGY AND SUSTAINABLE DEVELOPMENT I, 2017, 1864
  • [19] A fully secure attribute based broadcast encryption scheme
    Li, Qinyi
    Zhang, Fengli
    International Journal of Network Security, 2015, 17 (03) : 263 - 271
  • [20] Fully secure attribute-based broadcast encryption
    Sun, J. (oksunjin@xaut.edu.cn), 2012, Science Press (39):