Levelled attribute-based encryption for hierarchical access control

被引:0
|
作者
Le, Huy Quoc [1 ]
Le, Phi Thuong [2 ]
Trinh, Sy Tuan [2 ]
Susilo, Willy [3 ]
Trinh, Viet Cuong [2 ]
机构
[1] Tan Tao Univ, Sch Informat Technol, Tan Tao Univ Ave, Duc Hoa 82700, Long An Provinc, Vietnam
[2] Hong Duc Univ, Fac Informat & Commun Technol, Dong Ve Ward, Quang Trung St, Thanh Hoa City 40130, Thanh Hoa Provi, Vietnam
[3] Univ Wollongong, Sch Informat Technol & Comp, Northfields Ave, Wollongong, NSW 2522, Australia
关键词
Levelled attribute-based encryption; Hierarchical attribute; Key-policy; Ciphertext-policy; Attribute-based encryption; PRIME-ORDER GROUPS;
D O I
10.1016/j.csi.2024.103957
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) is an important primitive to address the problem of flexible one-to-many encryption. Attribute-based encryption has found many practical applications such as cloud storage systems, file sharing systems, e-Health, pay-TV systems, social networks, etc. However, in almost existing ABE schemes, the efficiency depends heavily on the number of attributes involved in the secret key and the ciphertext. This makes hierarchical access control in ABE, where attributes need to be hierarchically organized, could be inefficient. This paper introduces a novel concept of Levelled Attribute-based Encryption (Levelled ABE) as a solution to address the inefficiencies of standard ABE for hierarchical access control systems, where scalability and key management are critical. Levelled ABE presents a hierarchical attribute framework where attributes are organized into classes, and each attribute is assigned a level number within its class. By introducing this hierarchical structure, Levelled ABE enables finer-grained access control, scalability and more efficient key management. As a proof of concept, this paper also proposes two concrete constructions of Levelled ABE, one for key-policy and the other for ciphertext-policy. These constructions are comparable to existing ABE schemes. The security of the proposed constructions is proved in the generic group model.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption
    Asim, Muhammad
    Ignatenko, Tanya
    Petkovic, Milan
    Trivellato, Daniel
    Zannone, Nicola
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 212 - 217
  • [2] On the Feasibility of Attribute-Based Encryption for WLAN Access Control
    Pisa, Claudio
    Dargahi, Tooska
    Caponi, Alberto
    Bianchi, Giuseppe
    Blefari-Melazzi, Nicola
    2017 IEEE 13TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2017, : 783 - 790
  • [3] A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
    Xie, Yuanpeng
    Wen, Hong
    Wu, Bin
    Jiang, Yixin
    Meng, Jiaxiao
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2019, 7 (02) : 383 - 391
  • [4] A Hierarchical Attribute-Based Encryption Scheme
    ZOU Xiubin
    Wuhan University Journal of Natural Sciences, 2013, 18 (03) : 259 - 264
  • [5] Attribute-Based Hierarchical Access Control With Extendable Policy
    Xiao, Meiyan
    Li, Hongbo
    Huang, Qiong
    Yu, Shui
    Susilo, Willy
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1868 - 1883
  • [6] Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption data
    Liu, Ximeng
    Ma, Jianfeng
    Xiong, Jinbo
    Liu, Guangjun
    International Journal of Network Security, 2014, 16 (06) : 437 - 443
  • [7] Cross-Domain Attribute-Based Access Control Encryption
    Sedaghat, Mahdi
    Preneel, Bart
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2021, 2021, 13099 : 3 - 23
  • [8] Attribute-based Encryption for Access Control Using Elementary Operations
    Crampton, Jason
    Pinto, Alexandre
    2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2014, : 125 - 139
  • [9] Attribute-based Encryption for Cloud Computing Access Control: A Survey
    Zhang, Yinghui
    Deng, Robert H.
    Xu, Shengmin
    Sun, Jianfei
    Li, Qi
    Zheng, Dong
    ACM COMPUTING SURVEYS, 2020, 53 (04)
  • [10] On Attribute-Based Encryption for Access Control to Multidimensional Data Structures
    Epishkina, Anna
    Zapechnikov, Sergey
    BIOLOGICALLY INSPIRED COGNITIVE ARCHITECTURES (BICA) FOR YOUNG SCIENTISTS, 2018, 636 : 251 - 256