Browse > Article
http://dx.doi.org/10.5573/ieek.2013.50.9.021

Ciphertext Policy-Attribute Based Encryption with Non Monotonic Access Structures  

Sadikin, Rifki (Kyungpook National University)
Moon, SangJae (Kyungpook National University)
Park, YoungHo (Kyungpook National University)
Publication Information
Journal of the Institute of Electronics and Information Engineers / v.50, no.9, 2013 , pp. 21-31 More about this Journal
Abstract
A ciphertext policy-attribute based encryption(CP-ABE) scheme can be used to realize access control mechanism without a trusted server. We propose an attribute-based access control mechanism by incorporating a CP-ABE scheme to ensure only authorized users can access the sensitive data. The idea of CP-ABE is to include access control policy in the ciphertexts, in which they can only be decrypted if a user possesses attributes that pass through the ciphertext's access structure. In this paper, we prove a secure CP-ABE scheme where the policy can be expressed in non-monotonic access structures. We further compare the performance of our scheme with the existing CP-ABE schemes.
Keywords
ciphertext-policy attribute based encryption; public key encryption; access control;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Huang, Dijiang, and Mayank Verma, "ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks." Ad Hoc Networks, Vol 7, no. 8, pages 1526-1535, 2009.   DOI   ScienceOn
2 Liang, X., Barua, M., Lu, R., Lin, X., & Shen, X. S.. "Healthshare: Achieving secure and privacy-preserving health information sharing through health social networks.", Computer Communications, vol 35, no 15, pp. 1910-1920, 2012.   DOI   ScienceOn
3 Koo, D., Hur, J., & Yoon, H. "Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage.", Computers & Electrical Engineering, vol 39, no 1, pp 34-46, 2013.   DOI   ScienceOn
4 A. Beimel, Secure schemes for secret sharing and key distribution. PhD thesis, Israel Institute of Technology, 1996.
5 V. Shoup. "Lower bounds for discrete logarithms and related problems". In EUROCRYPT, pp. 256-266, 1997.
6 M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM conference on Computer and Communications Security (ACM CCS), pp. 62-73, 1993.
7 V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data." in Proceedings of the 13th ACM conference on Computer and communications security, CCS'06, (New York, NY, USA), pp. 89-98, ACM, 2006.
8 J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption." in IEEE Symposium on Security and Privacy, pp. 321-334, IEEE Computer Society, 2007.
9 L. Ibraimi, Q. Tang, P. Hartel, and W. Jonker, "Efficient and provable secure ciphertext-policy attribute-based encryption schemes." in Proceedings of the 5th International Conference on Information Security Practice and Experience, ISPEC '09, (Berlin, Heidelberg), pp. 1-12, Springer-Verlag, 2009.
10 B. Waters, "Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization." in Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography, PKC'11, (Berlin, Heidelberg), pp. 53-70, Springer-Verlag, 2011.
11 R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures." in Proceedings of the 14th ACM conference on Computer and communications security, pp. 195-203, 2007.
12 Goyal, V., Jain, A., Pandey, O., & Sahai, A.. "Bounded ciphertext policy attribute based encryption". In Automata, Languages and Programming, pp.579-591, Springer Berlin Heidelberg, 2008.
13 A. Sahai and B. Waters, "Fuzzy identity-based encryption", EUROCRYPT, Lecture Notes in Computer Science, vol 3494, pp. 457-473. Springer, 2005.
14 L. Cheung and C. Newport, "Provably secure ciphertext policy ABE," in Proceedings of the 14th ACM conference on Computer and communications security, CCS '07, (New York, NY, USA), pp. 456-465, ACM, 2007.
15 T. Okamoto and K. Takashima, "Fully secure functional encryption with general relations from the decisional linear assumption." in Advances in Cryptology CRYPTO 2010 (T. Rabin, ed.), vol. 6223 of Lecture Notes in Computer Science, pp. 191-208, Springer Berlin, Heidelberg, 2010.
16 R. S. Sandhu and P. Samarati, "Access Control: Principles and Practice.", Communications Magazine, IEEE, vol. 32, no. 9, pp. 40-48, 1994.
17 A. Kapadia, P. P. Tsang, and S. W. Smith. "Attribute-based publishing with hidden credentials and hidden policies." in Proceedings of The 14th Annual Network and Distributed System Security Symposium (NDSS), pp. 179-192, 2007.
18 M. Pirretti, P. Traynor, P. McDaniel and B. Waters, "Secure attribute-based systems." in Proceedings of the 13th ACM conference on Computer and communications security, pp. 99-112, 2006.