Attribute-based encryption with adaptive policy

被引:0
|
作者
Yiliang Han
机构
[1] Engineering University of PAP,Department of Electronic Technology
[2] State Key Laboratory of Cryptology,undefined
来源
Soft Computing | 2019年 / 23卷
关键词
Attribute-based encryption; Ciphertext policy; Key policy; Dual policy; Adaptive policy;
D O I
暂无
中图分类号
学科分类号
摘要
For the fine-grained data access control, attribute-based encryption (ABE) has become one of the potential components to secure cloud storage and social networks, in which the ciphertext is decrypted by the users with specific attributes instead of the unique identity. According to the access policy, ABE can be classified into three classes: ciphertext-policy (CP) ABE, key-policy (KP) ABE, and dual-policy (DP) ABE, which are, respectively, used to control attributes of data, attributes of users, and both of them. But when multiple requirements coexist, none of the three access policies could be applied directly. The paper proposed the new primitive called generalized policy attribute-based encryption (GP-ABE) firstly. A GP-ABE scheme based on bilinear pairing is designed also. In the proposal, the access structure is set by an identification function. Therefore, it could give different access policies according to different requirements adaptively, i.e., it gives the separate or combined access control on data attribute, user attribute, and both of them. Compared with the existing CP-ABE, KP-ABE, and DP-ABE, GP-ABE presents adaptive access policy while avoiding the additional cost. The proposed scheme is proved to be secure under selective attribute set attacks with q-bilinear Diffie–Hellman exponent assumption.
引用
收藏
页码:4009 / 4017
页数:8
相关论文
共 50 条
  • [1] Attribute-based encryption with adaptive policy
    Han, Yiliang
    [J]. SOFT COMPUTING, 2019, 23 (12) : 4009 - 4017
  • [2] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [3] Attribute-based encryption
    Sahai, Amit
    Waters, Brent
    Lu, Steve
    [J]. Cryptology and Information Security Series, 2009, 2 : 156 - 168
  • [4] Ciphertext Policy-Hiding Attribute-Based Encryption
    Yadav, Umesh Chandra
    Ali, Syed Taqi
    [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 2067 - 2071
  • [5] Accountable authority key policy attribute-based encryption
    Wang YongTao
    Chen KeFei
    Long Yu
    Liu ZhaoHui
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (07) : 1631 - 1638
  • [6] Accountable authority key policy attribute-based encryption
    WANG YongTao 1
    2 China Information Technology Security Evaluation Center
    3 Shanghai Key Laboratory of Scalable Computing and Systems
    4 State Key Laboratory of Information Security
    [J]. Science China(Information Sciences), 2012, 55 (07) : 1631 - 1638
  • [7] A Key-Policy Attribute-Based Broadcast Encryption
    Sun, Jin
    Hu, Yupu
    Zhang, Leyou
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (05) : 444 - 452
  • [8] Ciphertext-policy attribute-based delay encryption
    Chen, Lijiao
    Lv, Kewei
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (02) : 167 - 185
  • [9] Accountable authority key policy attribute-based encryption
    YongTao Wang
    KeFei Chen
    Yu Long
    ZhaoHui Liu
    [J]. Science China Information Sciences, 2012, 55 : 1631 - 1638
  • [10] Ciphertext Policy Attribute-Based Encryption from Lattices
    Zhang, Jiang
    Zhang, Zhenfeng
    Ge, Aijun
    [J]. 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,