Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption

被引:26
|
作者
Kim, Intae [1 ]
Susilo, Willy [1 ]
Baek, Joonsang [1 ]
Kim, Jongkil [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW 2522, Australia
基金
澳大利亚研究理事会;
关键词
Cryptography; Encryption; Security; Companies; Government; Servers; Hospitals; Fake policy attack; ABE; policy authenticatable ABE; hidden ciphertext policy ABE; BROADCAST ENCRYPTION; EFFICIENT;
D O I
10.1109/TDSC.2020.3040712
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The field of cryptography has endeavored to solve numerous security problems. However, a common premise of many of those problems is that the encryptor always generates the ciphertext correctly. Around 10 years ago, this premise was not a problem. However, due to the rapid development and the use of the cloud, which has introduced various access policies and functionalities to provide higher security, it is not correct to assume that this premise is always applied. A "Fake Policy Attack", which we introduce in this article, is an attack that incorrectly sets the access policy of the ciphertext against the system rules so that users who do not meet the rules can decrypt the ciphertext. In other words, it is an attack that ignores the rules of the system and eventually breaks the security and leaks information. This attack can be more critical for the application environments that require strong security not to leak any related information about ciphertext. In this article, we demonstrate the possible threat of the Fake Policy Attack by providing two relevant examples. Then, we propose a scheme called Policy Authenticable ABE (PA-ABE) to resolve this issue. We provide a formal security analysis of the proposed scheme and performance evaluation results based on our implementation.
引用
收藏
页码:1856 / 1870
页数:15
相关论文
共 50 条
  • [31] Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating
    Ying, Zuobin
    Li, Hui
    Ma, Jianfeng
    Zhang, Junwei
    Cui, Jiangtao
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (04)
  • [32] Ciphertext-policy attribute-based encryption with hidden sensitive policy from keyword search techniques in smart city
    Meng, Fei
    Cheng, Leixiao
    Wang, Mingqiang
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
  • [33] Ciphertext-policy attribute-based encryption with hidden sensitive policy from keyword search techniques in smart city
    Fei Meng
    Leixiao Cheng
    Mingqiang Wang
    [J]. EURASIP Journal on Wireless Communications and Networking, 2021
  • [34] Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating
    Zuobin YING
    Hui LI
    Jianfeng MA
    Junwei ZHANG
    Jiangtao CUI
    [J]. Science China(Information Sciences), 2016, 59 (04) : 187 - 202
  • [35] A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update
    Liu, Zhe
    Wang, Fuqun
    Chen, Kefei
    Tang, Fei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [36] Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
    Shijie Deng
    Gaobo Yang
    Wen Dong
    Ming Xia
    [J]. Multimedia Tools and Applications, 2023, 82 : 22251 - 22274
  • [37] Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
    Deng, Shijie
    Yang, Gaobo
    Dong, Wen
    Xia, Ming
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (14) : 22251 - 22274
  • [38] ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    [J]. BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, 2009, 46 (04) : 803 - 819
  • [39] Ciphertext-policy attribute-based encryption scheme with verifiability on authority
    Yu, Jinxia
    He, Xu
    Yan, Xixi
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (04): : 49 - 57
  • [40] Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application
    Ibraimi, Luan
    Petkovic, Milan
    Nikova, Svetla
    Hartel, Pieter
    Jonker, Willem
    [J]. INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 309 - +