Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits

被引:0
|
作者
Mahdi MahdaviOliaee
Zahra Ahmadian
机构
[1] Shahid Beheshti University,Electrical Engineering Department
[2] KU Leuven,imec
关键词
Ciphertext policy attribute based encryption (CP-ABE); Arithmetic circuit; Multilinear map; Adaptive security; Hidden attributes; Hidden result;
D O I
暂无
中图分类号
学科分类号
摘要
Applying access structure to encrypted sensitive data is one of the challenges in communication networks and cloud computing. Various methods have been proposed to achieve this goal, one of which is attribute-based encryption (ABE). In ABE schemes, the access structure, a.k.a policy, can be applied to the key or ciphertext. Thus, if the policy is applied to the key, the ABE scheme is called the key policy attribute-based encryption (KP-ABE), and if it is applied to the ciphertext, the scheme is called the ciphertext policy attribute-based encryption (CP-ABE). Since in the KP-ABE, the policy is selected once by a trusted entity and is fixed then, they are not suitable for applications where the policy needs to change repeatedly. This problem is solved in CP-ABE, where the policy is selected by the sender and can be changed for each message encryption. Furthermore, it is desired in the ABE schemes that a strong fine-grained access control can be realized. While most of the existing access structures are of Boolean type, an arithmetic access structure can support a stronger fine-grained access structure. We present the first CP-ABE scheme with an arithmetic circuit access policy based on the multilinear maps. First, we outline a basic design and then two improved versions of this scheme, with or without the property of hidden attributes, are introduced. We also define the concept of hidden result attribute based encryption (HR-ABE) which means that the result of the arithmetic function will not be revealed to the users. We define a new hardness assumption, called the (k-1)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(k-1)$$\end{document}-distance decisional Diffie–Hellman assumption, which is at least as hard as the k-multilinear decisional Diffie–Hellman assumption. Under this assumption, we prove the adaptive security of the proposed scheme.
引用
收藏
页码:515 / 528
页数:13
相关论文
共 50 条
  • [1] Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits
    MahdaviOliaee, Mahdi
    Ahmadian, Zahra
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023, 19 (04) : 515 - 528
  • [2] Fine-grained user access control in ciphertext-policy attribute-based encryption
    Hur, Junbeom
    Park, Chanil
    Hwang, Seong Oun
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (03) : 253 - 261
  • [3] Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption data
    Liu, Ximeng
    Ma, Jianfeng
    Xiong, Jinbo
    Liu, Guangjun
    International Journal of Network Security, 2014, 16 (06) : 437 - 443
  • [4] Blind expressive ciphertext policy attribute based encryption for fine grained access control on the encrypted data
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, No.2006 Xiyuan Avenue, West Hi-tech Zone, Chengdu
    611731, China
    不详
    Int. J. Netw. Secur., 6 (661-671):
  • [5] Key-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control
    Liu, Ximeng
    Zhu, Hui
    Ma, Jianfeng
    Ma, Jun
    Ma, Siqi
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC), 2014, : 694 - 699
  • [6] Fine-Grained Access Control for Cloud Data Sharing by Secure and Efficient Attribute-Revocable Ciphertext-Policy Attribute-Based Encryption
    Vaanchig, Nyamsuren
    Chen, Wei
    Qin, Zhiguang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (10): : 303 - 319
  • [7] Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption
    Du, Jiajie
    HelIl, Nurmamat
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (09): : 3274 - 3297
  • [8] Oblivious Transfer with Fine Grained Access Control from Ciphertext Policy Attribute Based Encryption in the Standard Model
    Fu, Xingbing
    Li, Fagen
    Zeng, Shengke
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (01): : 285 - 302
  • [9] Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing
    Liu, Jun'e
    Wan, Zhiguo
    Gu, Ming
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 98 - 107
  • [10] Implementation of Ciphertext Policy-Attribute Based Encryption (CP-ABE) for Fine Grained Access Control of University Data
    Porwal, Shardha
    Mittal, Sangeeta
    2017 TENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2017, : 25 - 31