Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts

被引:0
|
作者
Zhang, Yinghui [1 ,2 ]
Zheng, Dong [1 ]
Chen, Xiaofeng [3 ]
Li, Jin [4 ]
Li, Hui [3 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100096, Peoples R China
[3] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Peoples R China
[4] Guangzhou Univ, Sch Comp Sci, Guangzhou 510006, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Attribute-based encryption; Constant computation; Constant-size ciphertexts; Cloud computing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-policy attribute-based encryption (CP-ABE) is extremely suitable for cloud computing environment in that it enables data owners to make and enforce access policies themselves. However, most of the existing CP-ABE schemes suffer severe efficiency drawbacks due to large computation cost and ciphertext size, both of which linearly increase with the complexity of access policies. Aiming at tackling the challenge above, in this paper, we propose a CP-ABE scheme which features constant computation cost and constant-size ciphertexts. The proposed CP-ABE scheme is proven selective-secure in the random oracle model under the decision n-Bilinear Diffie-Hellman Exponent (n-BDHE) assumption, where n represents the total number of attributes in universe. In particular, the proposed scheme can efficiently support AND-gate access policies with multiple attribute values and wildcards. Performance comparisons indicate that the proposed CP-ABE scheme is promising in real-world applications, especially for the scenarios where computation and bandwidth issues are major concerns.
引用
收藏
页码:259 / 273
页数:15
相关论文
共 50 条
  • [1] Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost
    Chen, Cheng
    Zhang, Zhenfeng
    Feng, Dengguo
    [J]. PROVABLE SECURITY, 2011, 6980 : 84 - 101
  • [2] Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
    Deng, Hua
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    Zhang, Lei
    Liu, Jianwei
    Shi, Wenchang
    [J]. INFORMATION SCIENCES, 2014, 275 : 370 - 384
  • [3] Attribute-based encryption schemes with constant-size ciphertexts
    Attrapadung, Nuttapong
    Herranz, Javier
    Laguillaumie, Fabien
    Libert, Benoit
    de Panafieu, Elie
    Rafols, Carla
    [J]. THEORETICAL COMPUTER SCIENCE, 2012, 422 : 15 - 38
  • [4] Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
    Attrapadung, Nuttapong
    Libert, Benoit
    de Panafieu, Elie
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 90 - +
  • [5] Direct Revocable Ciphertext Policy Attribute-Based Encryption Scheme with Constant-Size Ciphertext
    Zhu, Guo-Bin
    Xie, Xin
    Zhang, Xing
    Zhao, Yang
    Xiong, Hu
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2021, 50 (01): : 76 - 83
  • [6] Expressive Ciphertext-policy Attribute-based Encryption Scheme with Fast Decryption and Constant-size Secret Keys
    Li Long
    Gu Tianlong
    Chang Liang
    Xu Zhoubo
    Qian Junyan
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (07) : 1661 - 1668
  • [7] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
    Emura, Keita
    Miyaji, Atsuko
    Nomura, Akito
    Omote, Kazumasa
    Soshi, Masakazu
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 13 - +
  • [8] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [9] Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsorced Verifiable Computation
    Zhang, Kai
    Gong, Junqing
    Tang, Shaohua
    Chen, Jie
    Li, Xiangxue
    Qian, Haifeng
    Cao, Zhenfu
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 269 - 279
  • [10] An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme with Policy Update
    Wang, Changji
    Yuan, Yuan
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (02): : 1031 - 1041