Provably Secure Ciphertext Policy ABE

被引:0
|
作者
Cheung, Ling [1 ]
Newport, Calvin [1 ]
机构
[1] MIT CSAIL, Cambridge, MA USA
关键词
Access Control; Attribute-Based Encryption; Public Key Cryptography; IDENTITY-BASED ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on attributes. Decryption is enabled if and only if the user's attribute set satisfies the ciphertext access structure. This provides fine-grained access control on shared data in many practical settings; e.g., secure database and IP multicast. In this paper, we study CP-ABE schemes in which access structures are AND gates on positive and negative attributes. Our basic scheme is proven to be chosen plaintext (CPA) secure under the decisional bilinear Diffie-Hellman (DBDH) assumption. We then apply the Canetti-HaleviKatz technique to obtain a chosen ciphertext (CCA) secure extension using one-time signatures. The security proof is a reduction to the DBDH assumption and the strong existential unforgeability of the signature primitive. In addition; we introduce hierarchical attributes to optimize our basic scheme-reducing both ciphertext size and encryption/decryption time while maintaining CPA security. We conclude with a discussion of practical applications of CP-ABE.
引用
收藏
页码:456 / 465
页数:10
相关论文
共 50 条
  • [41] An architecture for provably secure computation
    Ajtai, M
    Dwork, C
    Stockmeyer, L
    LATIN 2006: THEORETICAL INFORMATICS, 2006, 3887 : 56 - 67
  • [42] Provably secure masking of AES
    Blömer, J
    Guajardo, J
    Krummel, V
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 69 - 83
  • [43] Provably secure metering scheme
    Ogata, W
    Kurosawa, K
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 388 - 398
  • [44] On the Efficiency of Provably Secure NTRU
    Cabarcas, Daniel
    Weiden, Patrick
    Buchmann, Johannes
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 22 - 39
  • [45] Provably Secure Homomorphic Signcryption
    Rezaeibagha, Fatemeh
    Mu, Yi
    Zhang, Shiwei
    Wang, Xiaofen
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 349 - 360
  • [46] Provably Secure Reflection Ciphers
    Beyne, Tim
    Chen, Yu Long
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT IV, 2022, 13510 : 234 - 263
  • [47] Forward-secure ciphertext-policy attribute-based encryption scheme
    State Key Laboratory of Mathematical Engineering and Advanced Computing, PLA Information Engineering University, Zhengzhou
    450001, China
    Wei, Jiang-Hong, 1600, Editorial Board of Journal on Communications (35):
  • [48] Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes
    Ibraimi, Luan
    Tang, Qiang
    Hartel, Pieter
    Jonker, Willem
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 1 - 12
  • [49] Assured and Provable Data Expuncturing in cloud using Ciphertext Policy-Attribute Based Encryption (CP-ABE)
    Abinaya, P.
    Kumar, Senthil J.
    CYBERNETICS AND SYSTEMS, 2024, 55 (04) : 786 - 803
  • [50] Fully secure Ciphertext-policy Attribute-Based Encryption in Prime Order Group
    Lu, Songfeng
    Zhang, Yu
    Sun, Jie
    Yang, Liping
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 2920 - 2923