Provably Secure Ciphertext Policy ABE

被引:0
|
作者
Cheung, Ling [1 ]
Newport, Calvin [1 ]
机构
[1] MIT CSAIL, Cambridge, MA USA
关键词
Access Control; Attribute-Based Encryption; Public Key Cryptography; IDENTITY-BASED ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on attributes. Decryption is enabled if and only if the user's attribute set satisfies the ciphertext access structure. This provides fine-grained access control on shared data in many practical settings; e.g., secure database and IP multicast. In this paper, we study CP-ABE schemes in which access structures are AND gates on positive and negative attributes. Our basic scheme is proven to be chosen plaintext (CPA) secure under the decisional bilinear Diffie-Hellman (DBDH) assumption. We then apply the Canetti-HaleviKatz technique to obtain a chosen ciphertext (CCA) secure extension using one-time signatures. The security proof is a reduction to the DBDH assumption and the strong existential unforgeability of the signature primitive. In addition; we introduce hierarchical attributes to optimize our basic scheme-reducing both ciphertext size and encryption/decryption time while maintaining CPA security. We conclude with a discussion of practical applications of CP-ABE.
引用
收藏
页码:456 / 465
页数:10
相关论文
共 50 条
  • [1] An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption
    Balu, A.
    Kuppusamy, K.
    INFORMATION SCIENCES, 2014, 276 : 354 - 362
  • [2] Efficient Ciphertext-Policy ABE with Constant Ciphertext Length
    Phuong Viet Xuan Tran
    Thuc Nguyen Dinh
    Miyaji, Atsuko
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 543 - 549
  • [3] Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
    Waters, Brent
    PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 53 - 70
  • [4] An adaptively secure multi-authority ciphertext-policy ABE scheme on prime order groups
    School of Computer Science and Technology, Xidian University, Xi'an, Shaanxi 710071, China
    不详
    不详
    Tien Tzu Hsueh Pao, 4 (696-702):
  • [5] Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption
    Li, Qi
    Ma, Jianfeng
    Li, Rui
    Xiong, Jinbo
    Liu, Ximeng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4098 - 4109
  • [6] A Simple and Effective Scheme of Ciphertext-Policy ABE
    Yu, Minda
    Xu, Qiuliang
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 516 - 519
  • [7] Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption
    Tseng, Yi-Fan
    Fan, Chun-, I
    Lin, Chih-Wen
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (03) : 182 - 202
  • [8] Provably semi-statically secure broadcast signcryption scheme with small ciphertext
    Li, Ximing
    Yang, Bo
    Zhang, Mingwu
    ICIC Express Letters, 2011, 5 (03): : 803 - 808
  • [9] Provably Secure Threshold-Based ABE Scheme Without Bilinear Map
    Arijit Karati
    Ruhul Amin
    G. P. Biswas
    Arabian Journal for Science and Engineering, 2016, 41 : 3201 - 3213
  • [10] Provably Secure Threshold-Based ABE Scheme Without Bilinear Map
    Karati, Arijit
    Amin, Ruhul
    Biswas, G. P.
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2016, 41 (08) : 3201 - 3213