Attribute-based encryption with hidden policies in the access tree
academic paper|更新时间:2024-06-05
|
Attribute-based encryption with hidden policies in the access tree
Journal on CommunicationsVol. 36, Issue 9, Pages: 119-126(2015)
作者机构:
1. 北京交通大学 计算机与信息技术学院,北京100044
2. 信息保障技术重点实验室,北京100072
作者简介:
基金信息:
The National Natural Science Foundation of China(60973112);Discipline Construction and Graduate Education Foundation of Beijing Municipal Commission of Education(BMKY2011B06);Open Foundation of Science and Technology on In-formation Assurance Laboratory(KJ-13-02)
Yan SONG, Zhen HAN, Feng-mei LIU, et al. Attribute-based encryption with hidden policies in the access tree[J]. Journal on Communications, 2015, 36(9): 119-126.
DOI:
Yan SONG, Zhen HAN, Feng-mei LIU, et al. Attribute-based encryption with hidden policies in the access tree[J]. Journal on Communications, 2015, 36(9): 119-126. DOI: 10.11959/j.issn.1000-436x.2015135.
Attribute-based encryption with hidden policies in the access tree
The existing policies-hidden attribute-based encryption (ABE) schemes could only support a limited access structure
which resulted in weak expressiveness.A new structure of access tree was thus proposed to integrate attribute hiding and secret sharing into “and” gate
“or” gate and “threshold” gate.Then
a tree-based policies-hidden scheme was constructed by using composite order bilinear groups.Under dual system encryption
the scheme was proved to be secure.Furthermore
the analysis and experiment demonstrate that the scheme realize policies-hidden in the complex ac-cess structure without increasing the overhead of computation.As a result
it is more feasible and flexible for applica-tions.
SU J S , CAO D , WANG X F , et al . Attribute-based encryption schemes [J ] . Journal of Software , 2011 , 22 ( 6 ): 1299 - 1315 .
SAHAI A , WATERS B . Fuzzy identity-based encryption [A ] . Ad-vances in the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques(EUROCRYPT 2005) [C ] . Aarhus,Denmark , 2005 . 457 - 473 .
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [A ] . Proceedings of the 13th ACM Conference on Computer and Communications Security [C ] . Alexandria,VA,USA , 2006 . 89 - 98 .
BETHENCOUNT J , SAHAI A , WATERS B . Ciphertext-policy attrib-ute-based encryption [A ] . Proceedings of the 2007 IEEE Symposium on Security and Privacy(IEEE S&P 2007) [C ] . Oakland,CA,USA , 2007 . 321 - 334 .
KAPADIA A , TSANG PP , SMITH S W . Attribute-based publishing with hidden credential and hidden policies [A ] . Proceedings of the 14th Annual Network and Distributed System Security Symposim(NDSS 2007) [C ] . San Diego,CA,USA , 2007 . 179 - 192 .
NISHIDE T , YONEYAMA K , OHTA K . Attribute-based encryption with partially hidden encryptor-specified access structures [A ] . Pro-ceedings of the Applied Cryptography and Network Security (ACNS 2008) [C ] . New York,NY,USA , 2008 . 111 - 129 .
LAI J Z , DENG R H , LI Y J . Fully secure cipertext-policy hiding CP-ABE [A ] . Proceedings of the 7th Information Security Practice and Experience(ISPEC 2011) [C ] . Guangzhou,China , 2011 . 24 - 39 .
WANG H B , CHEN S Z . Attribute-based encryption with hidden ac-cess structures [J ] . Journal of Electronics and Information Technology , 2012 , 34 ( 2 ): 457 - 561 .
FREEMAN M . Converting pairing-based cryptosystems from com-posite-order groups to prime-order groups [A ] . Advances in Advances in the 29th Annual International Conference on the Theory and Appli-cations of Cryptographic Techniques(EUROCRYPT 2010) [C ] . Aarhus,Denmark , 2010 . 44 - 61 .
IBRAIMI L , TANG Q , HARTEL P , et al . Efficient and provable se-cure ciphertext-policy attribute-based encryption schemes [A ] . Pro-ceedings of the Information Security Practice and Experience [C ] . Xi'an,China , 2009 . 1 - 12 .
BONEH D , GOH E , NISSIM K . Evaluating 2-dnf formulas on cipher-texts [A ] . Proceedings of the 1st Theory of Cryptography Confer-ence(TCC 2005) [C ] . Cambridge,MA,USA , 2005 . 325 - 341 .
WATERS B . Dual system encryption:realizing fully secure ibe and hibe under simple assumptions [A ] . Advances in the 29th International CryptologyConference(CRYPTO 2009) [C ] . Santa Barbara,CA,USA , 2009 . 619 - 636 .
LYNN B . The pairing-based cryptography(PBC) library [EB/OL ] . http://crypto.Stanford.edu/pbc/ http://crypto.Stanford.edu/pbc/ .