Browse > Article
http://dx.doi.org/10.3837/tiis.2018.03.019

Fully secure non-monotonic access structure CP-ABE scheme  

Yang, Dan (State Key Laboratory of Integrated Service Networks, Xidian University)
Wang, Baocang (State Key Laboratory of Integrated Service Networks, Xidian University)
Ban, Xuehua (State Key Laboratory of Integrated Service Networks, Xidian University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.12, no.3, 2018 , pp. 1315-1329 More about this Journal
Abstract
Ciphertext-policy attribute-based encryption (CP-ABE) associates ciphertext with access policies. Only when the user's attributes satisfy the ciphertext's policy, they can be capable to decrypt the ciphertext. Expressivity and security are the two directions for the research of CP-ABE. Most of the existing schemes only consider monotonic access structures are selectively secure, resulting in lower expressivity and lower security. Therefore, fully secure CP-ABE schemes with non-monotonic access structure are desired. In the existing fully secure non-monotonic access structure CP-ABE schemes, the attributes that are set is bounded and a one-use constraint is required by these projects on attributes, and efficiency will be lost. In this paper, to overcome the flaw referred to above, we propose a new fully secure non-monotonic access structure CP-ABE. Our proposition enforces no constraints on the scale of the attributes that are set and permits attributes' unrestricted utilization. Furthermore, the scheme's public parameters are composed of a constant number of group elements. We further compare the performance of our scheme with former non-monotonic access structure ABE schemes. It is shown that our scheme has relatively lower computation cost and stronger security.
Keywords
Ciphertext-policy attribute based encryption; Non-monotonic access structure; Full security; Access control;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Sahai, A. and B. Waters., "Fuzzy identity-based encryption," in Proc. of International Conference on Theory and Applications of Cryptographic Techniques. 2005.
2 Bethencourt, J., A. Sahai, and B. Waters, "Ciphertext-Policy Attribute-Based Encryption," in Proc. of IEEE Symposium on Security and Privacy, 2007.
3 Chase, M., "Multi-authority attribute based encryption," in Proc. of Conference on Theory of Cryptography, 2007.
4 Cheung, L. and C. Newport, "Provably secure ciphertext policy ABE," in Proc. of ACM Conference on Computer and Communications Security, 2007.
5 Horvath, M., "Attribute-Based Encryption Optimized for Cloud Computing," Infocommunications Journal, vol. 7, no. 2, pp. 1-9, 2014.
6 Goyal, V., et al., "Bounded Ciphertext Policy Attribute Based Encryption," DBLP, pp. 579-591, 2008.
7 Goyal, V., et al., "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. of CCS '06 Proceedings of the 13th ACM conference on Computer and communications security, pp. 89-98, 2006.
8 Han, J., et al., "Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption," IEEE Transactions on Information Forensics & Security, vol. 10, no. 3, p. 665-678, 2015.   DOI
9 Lewko, A. and B. Waters, "Decentralizing Attribute-Based Encryption," in Proc. of Advances in Cryptology - EUROCRYPT 2011 - International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings. 2011.
10 Longo, R., C. Marcolla, and M. Sala, "Key-Policy Multi-authority Attribute-Based Encryption," in Proc. of International Conference on Algebraic Informatics, vol. 9270, pp. 152-164, 2016.
11 Li, J., et al., "Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing," Ksii Transactions on Internet & Information Systems, vol. 10, no. 7, 2016.
12 Phuong, T.V.X., et al., "Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key," Springer International Publishing, 2015.
13 Rouselakis, Y. and B. Waters, "Practical constructions and new proof methods for large universe attribute-based encryption," in Proc. of ACM Sigsac Conference on Computer & Communications Security, 2013.
14 Yuan, Q., C. Ma, and J. Lin, "Fine-Grained Access Control for Big Data Based on CP-ABE in Cloud Computing," Springer Berlin Heidelberg, pp. 344-352, 2015.
15 Sadikin, R., S.J. Moon, and Y.H. Park, "Ciphertext Policy-Attribute Based Encryption with Non Monotonic Access Structures," Journal of The Institue of Elcetronic Engineers of Korea, vol. 50, no. 9, p. 21-31, 2013.
16 Jiang, Y., et al., "Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts," International Journal of Information Security, pp. 1-13, 2017.
17 Guan, Z., et al., "Conditional Ciphertext-Policy Attribute-Based Encryption Scheme in Vehicular Cloud Computing," Mobile Information Systems, pp. 1-10, 2016.
18 Malluhi, Q.M., V.C. Trinh, and V.C. Trinh, "A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption," in Proc. of ACM on Asia Conference on Computer and Communications Security, 2017.
19 Ostrovsky, R., A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures," in Proc. of Ccs 07 Acm Conference on Computer & Communications Security, 2007.
20 Naor, M. and B. Pinkas, "Efficient trace and revoke schemes," International Journal of Information Security, vol. 9, no. 6, pp. 411-424, 2010.   DOI
21 Yamada, S., et al., "A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption," 2014: Springer Berlin Heidelberg, p. 275-292, 2014.
22 Wang, Y., et al., "CP-ABE Based Access Control for Cloud Storage," 2017: Springer International Publishing, 2017.
23 Waters, B., "Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions," in Proc. of International Cryptology Conference on Advances in Cryptology, 2009.
24 Okamoto, T. and K. Takashima, "Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption," in Proc. of CRYPTO, 2010.
25 Yang, X., et al, "Fully Secure Attribute-Based Encryption with Non-monotonic Access Structures," in Proc. of International Conference on Intelligent NETWORKING and Collaborative Systems, 2013.
26 Lewko, A., et al, "Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption," in Proc. of Advances in Cryptology - EUROCRYPT 2010, International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010. Proceedings, 2010.
27 Lewko, A. and B. Waters, "New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques," 2012: Springer Berlin Heidelberg, p. 180-198, 2012.