CP-ABE with Hidden Policy from Waters Efficient Construction

被引:2
|
作者
Wang, Zhiwei [1 ,2 ]
He, Mingjun [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing 210003, Jiangsu, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Nanjing 210044, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
ATTRIBUTE-BASED ENCRYPTION;
D O I
10.1155/2016/3257029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
ABE provides a good way for access controlling in cloud computing. However, in many application scenarios, access policies for encryption also should be protected since they may directly contain sensitive information. For example, in smart grid, the access policies may contain the private information about underlying data, data owner or the data recipients, and disclosing some sensitive access policies could result in negative publicity, or loss of market revenue. In this paper, we present a CP-ABE scheme with hidden policy from Waters efficient construction. In our scheme, the access policy is hidden by using the composite order bilinear groups and can be expressed with LSSS. Our scheme is proved CPA secure under four statics assumptions.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Effective CP-ABE with Hidden Access Policy
    Wang Y.
    Fan K.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2151 - 2159
  • [2] An Expressive Hidden Access Policy CP-ABE
    Khan, Fawad
    Li, Hui
    Zhang, Liangxuan
    Shen, Jian
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 178 - 186
  • [3] CP-ABE with outsourced decryption and directionally hidden policy
    Wang, Zhiwei
    Liu, Wenyang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) : 2387 - 2396
  • [4] Partially policy hidden CP-ABE supporting dynamic policy updating
    Ying, Zuo-Bin
    Ma, Jian-Feng
    Cui, Jiang-Tao
    Tongxin Xuebao/Journal on Communications, 2015, 36 (12):
  • [5] CP-ABE scheme supporting partially hidden access policy
    Liu, Xia
    Wang, Xinzu
    Zhang, Tao
    Chen, Yingge
    Wang, Rong
    Feng, Chaosheng
    Qin, Zhiguang
    Tongxin Xuebao/Journal on Communications, 2024, 45 (10): : 180 - 190
  • [6] FOC-PH-CP-ABE: An Efficient CP-ABE Scheme With Fully Outsourced Computation and Policy Hidden in the Industrial Internet of Things
    Luo, Wei
    Lv, Ziyi
    Yang, Laipu
    Han, Gang
    Zhang, Xiaoli
    IEEE SENSORS JOURNAL, 2024, 24 (18) : 28971 - 28981
  • [7] Improving Privacy-Preserving CP-ABE with Hidden Access Policy
    Zhang, Leyou
    Cui, Yilei
    Mu, Yi
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 596 - 605
  • [8] A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy
    Padhya, Mukti
    Jinwala, Devesh
    INFORMATION SYSTEMS SECURITY (ICISS 2014), 2014, 8880 : 167 - 184
  • [9] PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system
    Wei Zhang
    Zhishuo Zhang
    Hu Xiong
    Zhiguang Qin
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 613 - 627
  • [10] PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system
    Zhang, Wei
    Zhang, Zhishuo
    Xiong, Hu
    Qin, Zhiguang
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (01) : 613 - 627