Key-policy attribute-based encryption scheme for general circuits

被引:0
|
作者
Hu P. [1 ]
Gao H.-Y. [1 ]
机构
[1] Information Engineering University, Zhengzhou
来源
Ruan Jian Xue Bao/Journal of Software | 2016年 / 27卷 / 06期
基金
中国国家自然科学基金;
关键词
Attribute-based encryption; Cross layer output; General circuit; Multilinear map; Selective security;
D O I
10.13328/j.cnki.jos.004993
中图分类号
学科分类号
摘要
Through introducing the access structure into attribute-based encryption, users can achieve the fine-grained access control to the ciphertext. Any access structure can be realized by general circuit. Therefore, designing attribute-based encryption for general circuit is difficult in this field. Garg etc. presented the first general circuit access structure based on multilinear maps. However the usability of the access structures is rather limited as gate can only output layer by layer and the depth of the circuit are fixed in l. In order to solve this limitation, this paper proposes a key-policy attribute-based encryption scheme for general circuits based on the Garg's scheme. In key generation step, the new scheme implements any circuit that depth is greater than 1 and less than or equal to l by equivalent conversion of the circuit and addition of the conversion key. It also achieves cross layer output by adding its child node depth into every non-leaf node's key component. Selective security of the proposed scheme in the standard model is proved under the decisional multilinear Diffie-Hellman assumption. © Copyright 2016, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:1498 / 1510
页数:12
相关论文
共 14 条
  • [11] Beimel A., Secure schemes for secret sharing and key distribution, (1996)
  • [12] Tiplea F.L., Dragan C.C., Key-Policy attribute-based encryption for Boolean circuits from bilinear maps, Cryptography and Information Security in the Balkans, pp. 175-193, (2015)
  • [13] Xu J., Wen Q.Y., Li W.M., Jin Z.P., Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation in cloud computing, IEEE Trans. on Parallel and Distributed Systems, pp. 119-129, (2015)
  • [14] Waters B., Ciphertext-Policy attribute-based encryption: An expressive, efficient, and provably secure realization, Proc. of the Public Key Cryptography 2011, pp. 53-70, (2011)