Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits

被引:0
|
作者
Mahdi MahdaviOliaee
Zahra Ahmadian
机构
[1] Shahid Beheshti University,Electrical Engineering Department
[2] KU Leuven,imec
关键词
Ciphertext policy attribute based encryption (CP-ABE); Arithmetic circuit; Multilinear map; Adaptive security; Hidden attributes; Hidden result;
D O I
暂无
中图分类号
学科分类号
摘要
Applying access structure to encrypted sensitive data is one of the challenges in communication networks and cloud computing. Various methods have been proposed to achieve this goal, one of which is attribute-based encryption (ABE). In ABE schemes, the access structure, a.k.a policy, can be applied to the key or ciphertext. Thus, if the policy is applied to the key, the ABE scheme is called the key policy attribute-based encryption (KP-ABE), and if it is applied to the ciphertext, the scheme is called the ciphertext policy attribute-based encryption (CP-ABE). Since in the KP-ABE, the policy is selected once by a trusted entity and is fixed then, they are not suitable for applications where the policy needs to change repeatedly. This problem is solved in CP-ABE, where the policy is selected by the sender and can be changed for each message encryption. Furthermore, it is desired in the ABE schemes that a strong fine-grained access control can be realized. While most of the existing access structures are of Boolean type, an arithmetic access structure can support a stronger fine-grained access structure. We present the first CP-ABE scheme with an arithmetic circuit access policy based on the multilinear maps. First, we outline a basic design and then two improved versions of this scheme, with or without the property of hidden attributes, are introduced. We also define the concept of hidden result attribute based encryption (HR-ABE) which means that the result of the arithmetic function will not be revealed to the users. We define a new hardness assumption, called the (k-1)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(k-1)$$\end{document}-distance decisional Diffie–Hellman assumption, which is at least as hard as the k-multilinear decisional Diffie–Hellman assumption. Under this assumption, we prove the adaptive security of the proposed scheme.
引用
收藏
页码:515 / 528
页数:13
相关论文
共 50 条
  • [21] An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption
    Hu, Ronglei
    Ma, Ziwei
    Li, Li
    Zuo, Peiliang
    Li, Xiuying
    Wei, Jiaxin
    Liu, Sihui
    SENSORS, 2023, 23 (19)
  • [22] Fine-Grained Secure Attribute-Based Encryption
    Wang, Yuyu
    Pan, Jiaxin
    Chen, Yu
    JOURNAL OF CRYPTOLOGY, 2023, 36 (04)
  • [23] Fine-Grained Secure Attribute-Based Encryption
    Yuyu Wang
    Jiaxin Pan
    Yu Chen
    Journal of Cryptology, 2023, 36
  • [24] Fine-Grained Secure Attribute-Based Encryption
    Wang, Yuyu
    Pan, Jiaxin
    Chen, Yu
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT IV, 2021, 12828 : 179 - 207
  • [25] Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems
    Zhao, Fangming
    Nishide, Takashi
    Sakurai, Kouichi
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 83 - 97
  • [26] Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control
    Wang, Shangping
    Zhang, Xia
    Zhang, Yaling
    IET INFORMATION SECURITY, 2018, 12 (02) : 141 - 149
  • [27] Fine-Grained Access Control in Industrial Internet of Things Evaluating Outsourced Attribute-Based Encryption
    Ziegler, Dominik
    Sabongui, Josef
    Palfinger, Gerald
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019, 2019, 562 : 91 - 104
  • [28] A Fine-Grained IoT Data Access Control Scheme Combining Attribute-Based Encryption and Blockchain
    Lu, Xiaofeng
    Fu, Songbing
    Jiang, Cheng
    Lio, Pietro
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [29] New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing
    Zhang, Leyou
    Hu, Yupu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (05): : 1343 - 1356
  • [30] Attribute-Based Fine-Grained Access Control with User Revocation
    Ye, Jun
    Zhang, Wujun
    Wu, Shu-lin
    Gao, Yuan-yuan
    Qiu, Jia-tao
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 586 - 595