A Fully Secure Ciphertext-Policy Attribute-Based Encryption With a Tree-Based Access Structure

被引:0
|
作者
Rifki, Sadikin [1 ,3 ]
Park, YoungHo [2 ]
Moon, SangJae [1 ]
机构
[1] Kyungpook Natl Univ, Sch Elect Engn & Comp Sci, Taegu 702701, South Korea
[2] Kyungpook Natl Univ, Sch Elect Engn, Taegu 702701, South Korea
[3] Indonesian Inst Sci, Res Ctr Informat, Bandung 40135, Indonesia
基金
新加坡国家研究基金会;
关键词
ciphertext policy attribute based encryption; access control; pairing based cryptography; public encryption system; secure file distribution; DUAL SYSTEM ENCRYPTION; HIBE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A new fully secure ciphertext-policy attributed based encryption (CP-ABE) scheme with high expressibity access policy is presented. Our CP-ABE scheme uses tree-based access structure which includes AND, OR, threshold and NOT gates which granted high degree of expressibility for encryptor to make an access policy. Moreover, our scheme achieves full security CP-ABE definition where any access structure can be chosen as the challenge ciphertext. The proposed CP-ABE uses composite bilinear groups and dual encryption paradigm to achieve full security CP-ABE definition. We argue that our CP-ABE scheme is secure and feasible.
引用
收藏
页码:247 / 265
页数:19
相关论文
共 50 条
  • [1] Efficient and Fully Secure Forward Secure Ciphertext-Policy Attribute-Based Encryption
    Kitagawa, Takashi
    Kojima, Hiroki
    Attrapadung, Nuttapong
    Imai, Hideki
    [J]. INFORMATION SECURITY (ISC 2013), 2015, 7807 : 87 - 99
  • [2] Ciphertext-Policy Attribute-Based Encryption with Hiding Access Structure
    Yadav, Umesh Chandra
    [J]. 2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 23 - 27
  • [3] Fully secure Ciphertext-policy Attribute-Based Encryption in Prime Order Group
    Lu, Songfeng
    Zhang, Yu
    Sun, Jie
    Yang, Liping
    [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 2920 - 2923
  • [4] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [5] An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption
    Balu, A.
    Kuppusamy, K.
    [J]. INFORMATION SCIENCES, 2014, 276 : 354 - 362
  • [6] Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption
    Rao, Y. Sreenivasa
    Dutta, Ratna
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4157 - 4176
  • [7] Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption
    Feng, Xinyu
    Li, Cong
    Li, Dan
    Fang, Yuejian
    Shen, Qingni
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 192 - 204
  • [8] Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
    Li, Jiguo
    Wang, Haiping
    Zhang, Yichen
    Shen, Jian
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 3339 - 3352
  • [9] Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption
    Anada, Hiroaki
    Arita, Seiko
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2017, : 423 - 428
  • [10] Dynamic Ciphertext-Policy Attribute-Based Encryption for Expressive Access Policy
    Rao, Y. Sreenivasa
    Dutta, Ratna
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2014, 2014, 8337 : 275 - 286