DOI QR코드

DOI QR Code

Fully secure non-monotonic access structure CP-ABE scheme

  • Yang, Dan (State Key Laboratory of Integrated Service Networks, Xidian University) ;
  • Wang, Baocang (State Key Laboratory of Integrated Service Networks, Xidian University) ;
  • Ban, Xuehua (State Key Laboratory of Integrated Service Networks, Xidian University)
  • Received : 2017.07.31
  • Accepted : 2017.10.26
  • Published : 2018.03.31

Abstract

Ciphertext-policy attribute-based encryption (CP-ABE) associates ciphertext with access policies. Only when the user's attributes satisfy the ciphertext's policy, they can be capable to decrypt the ciphertext. Expressivity and security are the two directions for the research of CP-ABE. Most of the existing schemes only consider monotonic access structures are selectively secure, resulting in lower expressivity and lower security. Therefore, fully secure CP-ABE schemes with non-monotonic access structure are desired. In the existing fully secure non-monotonic access structure CP-ABE schemes, the attributes that are set is bounded and a one-use constraint is required by these projects on attributes, and efficiency will be lost. In this paper, to overcome the flaw referred to above, we propose a new fully secure non-monotonic access structure CP-ABE. Our proposition enforces no constraints on the scale of the attributes that are set and permits attributes' unrestricted utilization. Furthermore, the scheme's public parameters are composed of a constant number of group elements. We further compare the performance of our scheme with former non-monotonic access structure ABE schemes. It is shown that our scheme has relatively lower computation cost and stronger security.

Keywords

References

  1. Sahai, A. and B. Waters., "Fuzzy identity-based encryption," in Proc. of International Conference on Theory and Applications of Cryptographic Techniques. 2005.
  2. Bethencourt, J., A. Sahai, and B. Waters, "Ciphertext-Policy Attribute-Based Encryption," in Proc. of IEEE Symposium on Security and Privacy, 2007.
  3. Chase, M., "Multi-authority attribute based encryption," in Proc. of Conference on Theory of Cryptography, 2007.
  4. Cheung, L. and C. Newport, "Provably secure ciphertext policy ABE," in Proc. of ACM Conference on Computer and Communications Security, 2007.
  5. Goyal, V., et al., "Bounded Ciphertext Policy Attribute Based Encryption," DBLP, pp. 579-591, 2008.
  6. Goyal, V., et al., "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. of CCS '06 Proceedings of the 13th ACM conference on Computer and communications security, pp. 89-98, 2006.
  7. Han, J., et al., "Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption," IEEE Transactions on Information Forensics & Security, vol. 10, no. 3, p. 665-678, 2015. https://doi.org/10.1109/TIFS.2014.2382297
  8. Horvath, M., "Attribute-Based Encryption Optimized for Cloud Computing," Infocommunications Journal, vol. 7, no. 2, pp. 1-9, 2014.
  9. Lewko, A. and B. Waters, "Decentralizing Attribute-Based Encryption," in Proc. of Advances in Cryptology - EUROCRYPT 2011 - International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings. 2011.
  10. Longo, R., C. Marcolla, and M. Sala, "Key-Policy Multi-authority Attribute-Based Encryption," in Proc. of International Conference on Algebraic Informatics, vol. 9270, pp. 152-164, 2016.
  11. Phuong, T.V.X., et al., "Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key," Springer International Publishing, 2015.
  12. Rouselakis, Y. and B. Waters, "Practical constructions and new proof methods for large universe attribute-based encryption," in Proc. of ACM Sigsac Conference on Computer & Communications Security, 2013.
  13. Yuan, Q., C. Ma, and J. Lin, "Fine-Grained Access Control for Big Data Based on CP-ABE in Cloud Computing," Springer Berlin Heidelberg, pp. 344-352, 2015.
  14. Li, J., et al., "Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing," Ksii Transactions on Internet & Information Systems, vol. 10, no. 7, 2016.
  15. Jiang, Y., et al., "Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts," International Journal of Information Security, pp. 1-13, 2017.
  16. Guan, Z., et al., "Conditional Ciphertext-Policy Attribute-Based Encryption Scheme in Vehicular Cloud Computing," Mobile Information Systems, pp. 1-10, 2016.
  17. Malluhi, Q.M., V.C. Trinh, and V.C. Trinh, "A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption," in Proc. of ACM on Asia Conference on Computer and Communications Security, 2017.
  18. Ostrovsky, R., A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures," in Proc. of Ccs 07 Acm Conference on Computer & Communications Security, 2007.
  19. Naor, M. and B. Pinkas, "Efficient trace and revoke schemes," International Journal of Information Security, vol. 9, no. 6, pp. 411-424, 2010. https://doi.org/10.1007/s10207-010-0121-2
  20. Sadikin, R., S.J. Moon, and Y.H. Park, "Ciphertext Policy-Attribute Based Encryption with Non Monotonic Access Structures," Journal of The Institue of Elcetronic Engineers of Korea, vol. 50, no. 9, p. 21-31, 2013.
  21. Yamada, S., et al., "A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption," 2014: Springer Berlin Heidelberg, p. 275-292, 2014.
  22. Wang, Y., et al., "CP-ABE Based Access Control for Cloud Storage," 2017: Springer International Publishing, 2017.
  23. Waters, B., "Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions," in Proc. of International Cryptology Conference on Advances in Cryptology, 2009.
  24. Okamoto, T. and K. Takashima, "Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption," in Proc. of CRYPTO, 2010.
  25. Lewko, A., et al, "Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption," in Proc. of Advances in Cryptology - EUROCRYPT 2010, International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010. Proceedings, 2010.
  26. Lewko, A. and B. Waters, "New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques," 2012: Springer Berlin Heidelberg, p. 180-198, 2012.
  27. Yang, X., et al, "Fully Secure Attribute-Based Encryption with Non-monotonic Access Structures," in Proc. of International Conference on Intelligent NETWORKING and Collaborative Systems, 2013.