Key-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control

被引:0
|
作者
Liu, Ximeng [1 ]
Zhu, Hui [1 ]
Ma, Jianfeng [2 ]
Ma, Jun [2 ]
Ma, Siqi [3 ]
机构
[1] Xidian Univ, Sch Telecommun Engn, Xian, Peoples R China
[2] Xidian Univ, Sch Comp Sci & Technol, Xian, Peoples R China
[3] Singapore Management Univ, Sch Informat Syst, Singapore, Singapore
基金
中国国家自然科学基金;
关键词
Bilinear pairings; Attribute-based; Access structure; Weighted attribute; Encryption;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
When we step into the new internet era, large numbers of new techniques have emerged in order to make our life better. However, these new techniques require some new properties in order to keep personal information confidentially which the traditional encryption method cannot catch up with. Recently, a new encryption primitive called Attribute Based Encryption(ABE) have appeared because it can achieve both information security and fine-grained access control. Although the ABE scheme has these new characters which can keep the information security that can fit for the new widely used technique, nevertheless, the characteristic of attributes are treated in the identical level in most of traditional schemes. In the real scenario, the importance of each attributes is always different. In this paper, we propose a scheme called Key-Policy Weighted Attribute based Encryption (KP-WABE) while the attributes have different weights according to their importance in the system. The KP-WABE scheme is proved to be secure under the l-th Bilinear Diffie-Hellman Inversion Assumption. Our scheme can be considered as the generalization of traditional KP-ABE scheme when all attributes have equal weights.
引用
收藏
页码:694 / 699
页数:6
相关论文
共 50 条
  • [41] Adaptable key-policy attribute-based encryption with time interval
    Ma, Siqi
    Lai, Junzuo
    Deng, Robert H.
    Ding, Xuhua
    SOFT COMPUTING, 2017, 21 (20) : 6191 - 6200
  • [42] Lattice-based public key searchable encryption with fine-grained access control for edge computing
    Wang, Peng
    Chen, Biwen
    Xiang, Tao
    Wang, Zhongming
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 127 : 373 - 383
  • [43] Fine-grained data access control with attribute-hiding policy for cloud-based IoT
    Hao, Jialu
    Huang, Cheng
    Ni, Jianbing
    Rong, Hong
    Xian, Ming
    Shen, Xuemin
    COMPUTER NETWORKS, 2019, 153 : 1 - 10
  • [44] Hierarchical Attribute-Based Encryption for Fine-Grained Access Controlin Cloud Storage Services
    Wang, Guojun
    Liu, Qin
    Wu, Jie
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 735 - 737
  • [45] Key-Policy Attribute-Based Encryption With Equality Test in Cloud Computing
    Zhu, Huijun
    Wang, Licheng
    Ahmad, Haseeb
    Niu, Xinxin
    IEEE ACCESS, 2017, 5 : 20428 - 20439
  • [46] Oblivious Transfer with Fine Grained Access Control from Ciphertext Policy Attribute Based Encryption in the Standard Model
    Fu, Xingbing
    Li, Fagen
    Zeng, Shengke
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (01): : 285 - 302
  • [47] A Key-policy Attribute-based Encryption Scheme with Constant Size Ciphertext
    Wang, Chang-Ji
    Luo, Jian-Fa
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 447 - 451
  • [48] Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (11) : 2150 - 2162
  • [49] Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control
    Wang, Zhongming
    Chen, Biwen
    Xiang, Tao
    Zhou, Lu
    Yan, Hongyang
    Li, Jin
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021, 2021, 13059 : 3 - 18
  • [50] An Attribute-Based Encryption Scheme with LSSS Key-Policy from Lattices
    Liu, Lihua
    Wang, Shangping
    LECTURE NOTES IN REAL-TIME INTELLIGENT SYSTEMS (RTIS 2016), 2018, 613 : 217 - 230