Adaptively secure key-policy ABE scheme with fast decryption
Papers|更新时间:2024-06-05
|
Adaptively secure key-policy ABE scheme with fast decryption
Journal on CommunicationsVol. 35, Issue Z2, Pages: 26-32(2014)
作者机构:
1. 西安电子科技大学 计算机学院,陕西 西安 710071
2. 西安电子科技大学 陕西省网络与系统安全重点实验室,陕西 西安 710071
3. 通信信息控制和安全技术重点实验室,浙江 嘉兴,314033
4. 福建师范大学 软件学院,福建 福州 350108
5. 西安电子科技大学 通信工程学院,陕西 西安 710071
作者简介:
基金信息:
The Key Program of NSFC-Guangdong Union Foundation(U1135002);The National Natural Science Foundation of China(61370078);The National Natural Science Foundation of China(61402109);The Fundamental Research Funds for the Central Universities(JB142001-12)
linear secret sharing schemes)的单调访问策略,将解密开销降为常数级,并在标准模型下证明该方案是自适应安全的。
Abstract
In the existing adaptively secure ABE (attribute-based encryption) schemes
the decryption cost goes linearly with the number of attributes that are used in decryption.An adaptively secure key-policy ABE (FKP-ABE) scheme with fast decryption is proposed
where constant size of computation overhead is implemented in decryption.This scheme is constructed on composite order bilinear groups and supports any monotonic access structure that can be expressed by LSSS (linear secret sharing schemes).The proposed scheme is proved to be adaptively secure in the standard model.
关键词
Keywords
references
SAHAI A , WATERS B . Fuzzy identity-based encryption [A ] . Cryptology-EUROCRYPT 2005 [C ] . Springer Berlin Heidelberg , 2005 . 457 - 473 .
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [A ] . Proceedings of the 13th ACM Conference on Computer and Communications Security [C ] . 2006 . 89 - 98 .
OSTROVSKY R , SAHAI A , WATERS B . Attribute-based encryption with non-monotonic access structures [A ] . Proceedings of the 14th ACM Conference on Computer and Communications Security [C ] . 2007 . 195 - 203 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [A ] . IEEE Symposium on Security and Privacy,2007 [C ] . 2007 . 321 - 334 .
CHEUNG L , NEWPORT C . Provably secure ciphertext policy ABE [A ] . Proceedings of the 14th ACM Conference on Computer and Communications Security [C ] . 2007 . 456 - 465 .
GOYAL V , JAIN A , PANDEY O , et al . Bounded Ciphertext Policy Attribute Based Encryption [M ] . Automata,Languages and Programming,Springer Berlin Heidelberg , 2008 . 579 - 591 .
WATERS B . Ciphertext-policy Attribute-based Encryption:an Expressive,Efficient,and Provably Secure Realization [M ] . Public Key Cryptography-PKC 2011,Springer Berlin Heidelberg , 2011 . 53 - 70 .
ATTRAPADUNG N , LIBERT B , De PANAFIEU E . Expressive Key-Policy Attribute-based Encryption with Constant-size Ciphertexts [M ] . Public Key Cryptography–PKC 2011,Springer Berlin Heidelberg , 2011 . 90 - 108 .
ATTRAPADUNG N , HERRANZ J , LAGUILLAUMIE F , et al . Attribute-based encryption schemes with constant-size ciphertexts [J ] . Theoretical Computer Science , 2012 , 422 : 15 - 38 .
HOHENBERGER S , WATERS B . Attribute-Based Encryption with Fast Decryption [M ] . Public-Key Cryptography–PKC 2013,Springer Berlin Heidelberg , 2013 . 162 - 179 .
CANETTI R , HALEVI S , KATZ J . A forward-secure public-key encryption scheme [A ] . Cryptology—Eurocrypt 2003 [C ] . Springer Berlin Heidelberg , 2003 . 255 - 271 .
OKAMOTO T , TAKASHIMA K . Fully secure functional encryption with general relations from the decisional linear assumption [A ] . Cryptology–CRYPTO 2010 [C ] . Springer Berlin Heidelberg , 2010 . 191 - 208 .
LEWKO A , OKAMOTO T , SAHAI A , et al . Fully secure functional encryption:attribute-based encryption and (hierarchical) inner product encryption [A ] . Cryptology–EUROCRYPT 2010 [C ] . Springer Berlin Heidelberg , 2010 . 62 - 91 .
BONEH D , GOH E J , NISSIM K . Evaluating 2-DNF Formulas on Ciphertexts [M ] . Theory of Cryptography . Springer Berlin Heidelberg , 2005 . 325 - 341 .
BEIMEL A . Secure Schemes for Secret Sharing and Key Distribution [D ] . PhD Thesis,Israel Institute of Technology,Technion,Haifa,Israel , 1996 .