A Fully Secure Ciphertext-Policy Attribute-Based Encryption With a Tree-Based Access Structure

被引:0
|
作者
Rifki, Sadikin [1 ,3 ]
Park, YoungHo [2 ]
Moon, SangJae [1 ]
机构
[1] Kyungpook Natl Univ, Sch Elect Engn & Comp Sci, Taegu 702701, South Korea
[2] Kyungpook Natl Univ, Sch Elect Engn, Taegu 702701, South Korea
[3] Indonesian Inst Sci, Res Ctr Informat, Bandung 40135, Indonesia
基金
新加坡国家研究基金会;
关键词
ciphertext policy attribute based encryption; access control; pairing based cryptography; public encryption system; secure file distribution; DUAL SYSTEM ENCRYPTION; HIBE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A new fully secure ciphertext-policy attributed based encryption (CP-ABE) scheme with high expressibity access policy is presented. Our CP-ABE scheme uses tree-based access structure which includes AND, OR, threshold and NOT gates which granted high degree of expressibility for encryptor to make an access policy. Moreover, our scheme achieves full security CP-ABE definition where any access structure can be chosen as the challenge ciphertext. The proposed CP-ABE uses composite bilinear groups and dual encryption paradigm to achieve full security CP-ABE definition. We argue that our CP-ABE scheme is secure and feasible.
引用
收藏
页码:247 / 265
页数:19
相关论文
共 50 条
  • [11] Ciphertext-policy attribute-based delay encryption
    Chen, Lijiao
    Lv, Kewei
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (02) : 167 - 185
  • [12] Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption
    Anada, Hiroaki
    Arita, Seiko
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2017, : 423 - 428
  • [13] Ciphertext-Policy Attribute-Based Encryption with Non-Monotonic Access Structure
    Jia Hong-Yong
    Chen Yue
    Mao Xiu-Qing
    Dou Rui-Yu
    [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL IV, 2010, : 484 - 487
  • [14] Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes
    Ibraimi, Luan
    Tang, Qiang
    Hartel, Pieter
    Jonker, Willem
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 1 - 12
  • [15] Forward-secure ciphertext-policy attribute-based encryption scheme
    State Key Laboratory of Mathematical Engineering and Advanced Computing, PLA Information Engineering University, Zhengzhou
    450001, China
    [J]. Wei, Jiang-Hong, 1600, Editorial Board of Journal on Communications (35):
  • [16] Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating
    Ying, Zuobin
    Li, Hui
    Ma, Jianfeng
    Zhang, Junwei
    Cui, Jiangtao
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (04)
  • [17] Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating
    Zuobin YING
    Hui LI
    Jianfeng MA
    Junwei ZHANG
    Jiangtao CUI
    [J]. Science China(Information Sciences), 2016, 59 (04) : 187 - 202
  • [18] Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator
    Chen, Yuechen
    Jiang, Zoe L.
    Yiu, S. M.
    Liu, Joseph K.
    Au, Man Ho
    Wang, Xuan
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 274 - 289
  • [19] Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment
    Nayudu P.P.
    Sekhar K.R.
    [J]. Computer Systems Science and Engineering, 2023, 46 (01): : 1079 - 1092
  • [20] Server Aided Ciphertext-Policy Attribute-Based Encryption
    Wang, Hao
    Yang, Bo
    Wang, Yilei
    [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 440 - 444