Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits

被引:0
|
作者
Mahdi MahdaviOliaee
Zahra Ahmadian
机构
[1] Shahid Beheshti University,Electrical Engineering Department
[2] KU Leuven,imec
关键词
Ciphertext policy attribute based encryption (CP-ABE); Arithmetic circuit; Multilinear map; Adaptive security; Hidden attributes; Hidden result;
D O I
暂无
中图分类号
学科分类号
摘要
Applying access structure to encrypted sensitive data is one of the challenges in communication networks and cloud computing. Various methods have been proposed to achieve this goal, one of which is attribute-based encryption (ABE). In ABE schemes, the access structure, a.k.a policy, can be applied to the key or ciphertext. Thus, if the policy is applied to the key, the ABE scheme is called the key policy attribute-based encryption (KP-ABE), and if it is applied to the ciphertext, the scheme is called the ciphertext policy attribute-based encryption (CP-ABE). Since in the KP-ABE, the policy is selected once by a trusted entity and is fixed then, they are not suitable for applications where the policy needs to change repeatedly. This problem is solved in CP-ABE, where the policy is selected by the sender and can be changed for each message encryption. Furthermore, it is desired in the ABE schemes that a strong fine-grained access control can be realized. While most of the existing access structures are of Boolean type, an arithmetic access structure can support a stronger fine-grained access structure. We present the first CP-ABE scheme with an arithmetic circuit access policy based on the multilinear maps. First, we outline a basic design and then two improved versions of this scheme, with or without the property of hidden attributes, are introduced. We also define the concept of hidden result attribute based encryption (HR-ABE) which means that the result of the arithmetic function will not be revealed to the users. We define a new hardness assumption, called the (k-1)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(k-1)$$\end{document}-distance decisional Diffie–Hellman assumption, which is at least as hard as the k-multilinear decisional Diffie–Hellman assumption. Under this assumption, we prove the adaptive security of the proposed scheme.
引用
收藏
页码:515 / 528
页数:13
相关论文
共 50 条
  • [31] An Attribute-Based Fine-Grained Access Control Mechanism for HBase
    Huang, Liangqiang
    Zhu, Yan
    Wang, Xin
    Khurshid, Faisal
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, PT I, 2019, 11706 : 44 - 59
  • [32] An Attribute-Based Encryption Scheme with Revocation for Fine-Grained Access Control in Wireless Body Area Networks
    Tian, Ye
    Peng, Yanbin
    Peng, Xinguang
    Li, Hongbin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [33] Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update
    Jiang, Yinhao
    Susilo, Willy
    Mu, Yi
    Guo, Fuchun
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 39 - 60
  • [34] Fine-grained data access control with attribute-hiding policy for cloud-based IoT
    Hao, Jialu
    Huang, Cheng
    Ni, Jianbing
    Rong, Hong
    Xian, Ming
    Shen, Xuemin
    COMPUTER NETWORKS, 2019, 153 : 1 - 10
  • [35] Hierarchical Attribute-Based Encryption for Fine-Grained Access Controlin Cloud Storage Services
    Wang, Guojun
    Liu, Qin
    Wu, Jie
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 735 - 737
  • [36] Enhancing Lattice-Based Attribute-Based Encryption with Robust Fine-Grained Access Policies
    Khajouei-Nejad, Sedigheh
    Jabbehdari, Sam
    Javadi, Hamid Haj Seyyed
    Moattar, Seyed Mohammad Hossein
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 17 (01): : 13 - 23
  • [37] Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
    Deng, Shijie
    Yang, Gaobo
    Dong, Wen
    Xia, Ming
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (14) : 22251 - 22274
  • [38] Dual-Policy Attribute Based Encryption: Simultaneous Access Control with Ciphertext and Key Policies
    Attrapadung, Nuttapong
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 116 - 125
  • [39] Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
    Shijie Deng
    Gaobo Yang
    Wen Dong
    Ming Xia
    Multimedia Tools and Applications, 2023, 82 : 22251 - 22274
  • [40] Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption
    Wang, Geng
    Liu, Zhen
    Gu, Dawu
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 378 - 396