Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits

被引:0
|
作者
Mahdi MahdaviOliaee
Zahra Ahmadian
机构
[1] Shahid Beheshti University,Electrical Engineering Department
[2] KU Leuven,imec
关键词
Ciphertext policy attribute based encryption (CP-ABE); Arithmetic circuit; Multilinear map; Adaptive security; Hidden attributes; Hidden result;
D O I
暂无
中图分类号
学科分类号
摘要
Applying access structure to encrypted sensitive data is one of the challenges in communication networks and cloud computing. Various methods have been proposed to achieve this goal, one of which is attribute-based encryption (ABE). In ABE schemes, the access structure, a.k.a policy, can be applied to the key or ciphertext. Thus, if the policy is applied to the key, the ABE scheme is called the key policy attribute-based encryption (KP-ABE), and if it is applied to the ciphertext, the scheme is called the ciphertext policy attribute-based encryption (CP-ABE). Since in the KP-ABE, the policy is selected once by a trusted entity and is fixed then, they are not suitable for applications where the policy needs to change repeatedly. This problem is solved in CP-ABE, where the policy is selected by the sender and can be changed for each message encryption. Furthermore, it is desired in the ABE schemes that a strong fine-grained access control can be realized. While most of the existing access structures are of Boolean type, an arithmetic access structure can support a stronger fine-grained access structure. We present the first CP-ABE scheme with an arithmetic circuit access policy based on the multilinear maps. First, we outline a basic design and then two improved versions of this scheme, with or without the property of hidden attributes, are introduced. We also define the concept of hidden result attribute based encryption (HR-ABE) which means that the result of the arithmetic function will not be revealed to the users. We define a new hardness assumption, called the (k-1)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(k-1)$$\end{document}-distance decisional Diffie–Hellman assumption, which is at least as hard as the k-multilinear decisional Diffie–Hellman assumption. Under this assumption, we prove the adaptive security of the proposed scheme.
引用
收藏
页码:515 / 528
页数:13
相关论文
共 50 条
  • [41] Privacy Preserving Searchable Encryption with Fine-Grained Access Control
    Chaudhari, Payal
    Das, Manik Lal
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (02) : 753 - 762
  • [42] Access policy sheet for access control in fine-grained XML
    Wu, J
    Mu, Y
    Seberry, J
    Ruan, C
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 1273 - 1282
  • [43] Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
    Li, Jiguo
    Wang, Haiping
    Zhang, Yichen
    Shen, Jian
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 3339 - 3352
  • [44] Bounded ciphertext policy attribute based encryption
    Goyal, Vipul
    Jain, Abhishek
    Pandey, Omkant
    Sahai, Amit
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, PROCEEDINGS, 2008, 5126 : 579 - 591
  • [45] Dynamic Ciphertext-Policy Attribute-Based Encryption for Expressive Access Policy
    Rao, Y. Sreenivasa
    Dutta, Ratna
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2014, 2014, 8337 : 275 - 286
  • [46] CIPHERTEXT-POLICY ATTRIBUTE BASED ENCRYPTION WITH SELECTIVELY-HIDDEN ACCESS POLICY
    Arkin, Gulmire
    Helil, Nurmamat
    COMPUTING AND INFORMATICS, 2021, 40 (05) : 1136 - 1159
  • [47] Secure Fine-grained Attribute-based Access Control with Hidden Policy for Electronic Health Record System
    Ji, Sai
    Jin, Xin
    Lai, Jin-Feng
    Shen, Jian
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (04): : 941 - 948
  • [48] Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid
    Li, Hongwei
    Liu, Dongxiao
    Alharbi, Khalid
    Zhang, Shenmin
    Lin, Xiaodong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (04): : 1404 - 1423
  • [49] Ciphertext-Policy Attribute-Based Encryption with Hiding Access Structure
    Yadav, Umesh Chandra
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 23 - 27
  • [50] A Key-Policy Searchable Attribute-Based Encryption Scheme for Efficient Keyword Search and Fine-Grained Access Control over Encrypted Data
    Yin, Hui
    Xiong, Yinqiao
    Zhang, Jixin
    Ou, Lu
    Liao, Shaolin
    Qin, Zheng
    ELECTRONICS, 2019, 8 (03)