Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts

被引:0
|
作者
Zhang, Yinghui [1 ,2 ]
Zheng, Dong [1 ]
Chen, Xiaofeng [3 ]
Li, Jin [4 ]
Li, Hui [3 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100096, Peoples R China
[3] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Peoples R China
[4] Guangzhou Univ, Sch Comp Sci, Guangzhou 510006, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Attribute-based encryption; Constant computation; Constant-size ciphertexts; Cloud computing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-policy attribute-based encryption (CP-ABE) is extremely suitable for cloud computing environment in that it enables data owners to make and enforce access policies themselves. However, most of the existing CP-ABE schemes suffer severe efficiency drawbacks due to large computation cost and ciphertext size, both of which linearly increase with the complexity of access policies. Aiming at tackling the challenge above, in this paper, we propose a CP-ABE scheme which features constant computation cost and constant-size ciphertexts. The proposed CP-ABE scheme is proven selective-secure in the random oracle model under the decision n-Bilinear Diffie-Hellman Exponent (n-BDHE) assumption, where n represents the total number of attributes in universe. In particular, the proposed scheme can efficiently support AND-gate access policies with multiple attribute values and wildcards. Performance comparisons indicate that the proposed CP-ABE scheme is promising in real-world applications, especially for the scenarios where computation and bandwidth issues are major concerns.
引用
收藏
页码:259 / 273
页数:15
相关论文
共 50 条
  • [41] Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
    Li, Jiguo
    Wang, Haiping
    Zhang, Yichen
    Shen, Jian
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 3339 - 3352
  • [42] Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
    Waters, Brent
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 53 - 70
  • [43] Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
    Yong CHENG
    Zhi-ying WANG
    Jun MA
    Jiang-jiang WU
    Song-zhu MEI
    Jiang-chun REN
    [J]. Frontiers of Information Technology & Electronic Engineering, 2013, (02) : 85 - 97
  • [44] Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
    Cheng, Yong
    Wang, Zhi-ying
    Ma, Jun
    Wu, Jiang-jiang
    Mei, Song-zhu
    Ren, Jiang-chun
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2013, 14 (02): : 85 - 97
  • [45] An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things
    Li, Hang
    Yu, Keping
    Liu, Bin
    Feng, Chaosheng
    Qin, Zhiguang
    Srivastava, Gautam
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2022, 26 (05) : 1949 - 1960
  • [46] On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption
    Zhou, Zhibin
    Huang, Dijiang
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 753 - 755
  • [47] An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption
    Balu, A.
    Kuppusamy, K.
    [J]. INFORMATION SCIENCES, 2014, 276 : 354 - 362
  • [48] Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application
    Ibraimi, Luan
    Petkovic, Milan
    Nikova, Svetla
    Hartel, Pieter
    Jonker, Willem
    [J]. INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 309 - +
  • [49] Online/offline ciphertext-policy attribute-based searchable encryption
    Chen D.
    Cao Z.
    Dong X.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (10): : 2365 - 2375
  • [50] ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    [J]. BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, 2009, 46 (04) : 803 - 819