Cipher Text Policy Attribute Based Broadcast Encryption for Multi-Privileged Groups

被引:0
|
作者
Angamuthu, Muthulakshmi [1 ]
Mani, Akshaya [2 ]
Ramalingam, Anitha [3 ]
机构
[1] PSG Coll Technol, Dept Math, Coimbatore, Tamil Nadu, India
[2] Georgetown Univ, Dept Comp Sci, Washington, DC 20057 USA
[3] PSG Coll Technol, Dept Appl Math & Computat Sci, Coimbatore, Tamil Nadu, India
关键词
Attribute based broadcast encryption; decisional bilinear diffie hellman problem and decisional diffie hellman problem; multi-privileged groups; cipher text policy; SCHEME; EFFICIENT;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the current globalization scenario, many group communication applications have become vital and the users not only subscribe to a single resource, but they use multiple resources and hence ending up with multi-privileged groups. In some group communication applications, it is desirable to encrypt the contents without exact knowledge of the set of intended receivers. Attribute based encryption offers this ability and enforces access policies defined on attributes, within the encryption process. In these schemes, the encryption keys and/or cipher texts are labelled with sets of descriptive attributes defined for the system users, and a particular user private key can decrypt only if the two match. This paper presents a cipher text policy attribute based broadcast encryption scheme for multi-privileged group of users. The proposed scheme has been proved secure using random oracle model.
引用
收藏
页码:313 / 320
页数:8
相关论文
共 50 条
  • [31] Multi authority attribute based encryption with attribute revocation
    Liu Zhenpeng
    Zhu Xianchao
    Zhang Shouhua
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1872 - 1876
  • [32] Attribute-based broadcast encryption scheme made efficient
    Lubicz, David
    Sirvent, Thomas
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 325 - +
  • [33] Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing
    Xiong, Hu
    Zhao, Yanan
    Peng, Li
    Zhang, Hao
    Yeh, Kuo-Hui
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 97 : 453 - 461
  • [34] Weight-Based Batch Rekeying Scheme for Dynamic Multi-privileged Group Communications
    Zhou, Wei
    Xu, Yang
    Yang, Lijuan
    Wang, Guojun
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 678 - 690
  • [35] ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, 2009, 46 (04) : 803 - 819
  • [36] Multi-Authority Attribute Based Encryption With Policy-hidden and Accountability
    Zhang, Wei
    Zhang, ZhiShuo
    Wu, Yi
    2020 INTERNATIONAL CONFERENCE ON SPACE-AIR-GROUND COMPUTING (SAGC 2020), 2020, : 95 - 96
  • [37] Key-Policy Multi-authority Attribute-Based Encryption
    Longo, Riccardo
    Marcolla, Chiara
    Sala, Massimiliano
    ALGEBRAIC INFORMATICS (CAI 2015), 2015, 9270 : 152 - 164
  • [38] ID-based hierarchical key graph scheme in multi-privileged group communications
    Wang, Guojun
    Jie Ouyang
    Chen, Hsiao-Hwa
    Guo, Miny
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 172 - +
  • [39] Attribute-based encryption with adaptive policy
    Yiliang Han
    Soft Computing, 2019, 23 : 4009 - 4017
  • [40] Bounded ciphertext policy attribute based encryption
    Goyal, Vipul
    Jain, Abhishek
    Pandey, Omkant
    Sahai, Amit
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, PROCEEDINGS, 2008, 5126 : 579 - 591