Levelled attribute-based encryption for hierarchical access control

被引:0
|
作者
Le, Huy Quoc [1 ]
Le, Phi Thuong [2 ]
Trinh, Sy Tuan [2 ]
Susilo, Willy [3 ]
Trinh, Viet Cuong [2 ]
机构
[1] Tan Tao Univ, Sch Informat Technol, Tan Tao Univ Ave, Duc Hoa 82700, Long An Provinc, Vietnam
[2] Hong Duc Univ, Fac Informat & Commun Technol, Dong Ve Ward, Quang Trung St, Thanh Hoa City 40130, Thanh Hoa Provi, Vietnam
[3] Univ Wollongong, Sch Informat Technol & Comp, Northfields Ave, Wollongong, NSW 2522, Australia
关键词
Levelled attribute-based encryption; Hierarchical attribute; Key-policy; Ciphertext-policy; Attribute-based encryption; PRIME-ORDER GROUPS;
D O I
10.1016/j.csi.2024.103957
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) is an important primitive to address the problem of flexible one-to-many encryption. Attribute-based encryption has found many practical applications such as cloud storage systems, file sharing systems, e-Health, pay-TV systems, social networks, etc. However, in almost existing ABE schemes, the efficiency depends heavily on the number of attributes involved in the secret key and the ciphertext. This makes hierarchical access control in ABE, where attributes need to be hierarchically organized, could be inefficient. This paper introduces a novel concept of Levelled Attribute-based Encryption (Levelled ABE) as a solution to address the inefficiencies of standard ABE for hierarchical access control systems, where scalability and key management are critical. Levelled ABE presents a hierarchical attribute framework where attributes are organized into classes, and each attribute is assigned a level number within its class. By introducing this hierarchical structure, Levelled ABE enables finer-grained access control, scalability and more efficient key management. As a proof of concept, this paper also proposes two concrete constructions of Levelled ABE, one for key-policy and the other for ciphertext-policy. These constructions are comparable to existing ABE schemes. The security of the proposed constructions is proved in the generic group model.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] Secure Attribute-Based Encryption With Access Control to Data Medical Records
    Fitri, Novi Aryani
    Al Rasyid, M. Udin Harun
    Sudarsono, Amang
    2018 INTERNATIONAL ELECTRONICS SYMPOSIUM ON KNOWLEDGE CREATION AND INTELLIGENT COMPUTING (IES-KCIC), 2018, : 105 - 111
  • [22] Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things
    Zhang, Yuanyu
    Nakanishi, Ruka
    Sasabe, Masahiro
    Kasahara, Shoji
    SENSORS, 2021, 21 (15)
  • [23] An Access Control Model for Cloud Storage Using Attribute-Based Encryption
    Sukhodolskiy, Ilya A.
    Zapechnikov, Sergey V.
    PROCEEDINGS OF THE 2017 IEEE RUSSIA SECTION YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING CONFERENCE (2017 ELCONRUS), 2017, : 578 - 581
  • [24] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    COMPUTER, 2015, 48 (02) : 85 - 88
  • [25] Location Hierarchical Access Control Scheme based on Attribute Encryption
    Lin, Xi
    Han, Yiliang
    PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, : 9010 - 9014
  • [26] A Role-Based Access Control System Using Attribute-Based Encryption
    Wang, Yong
    Ma, Yuan
    Xiang, Keyu
    Liu, Zhenyan
    Li, Ming
    2018 INTERNATIONAL CONFERENCE ON BIG DATA AND ARTIFICIAL INTELLIGENCE (BDAI 2018), 2018, : 128 - 133
  • [27] A fully distributed hierarchical attribute-based encryption scheme
    Ali, Mohammad
    Mohajeri, Javad
    Sadeghi, Mohammad-Reza
    Liu, Ximeng
    THEORETICAL COMPUTER SCIENCE, 2020, 815 : 25 - 46
  • [28] HGAA: An Architecture to Support Hierarchical Group and Attribute-Based Access Control
    Servos, Daniel
    Osborn, Sylvia L.
    PROCEEDINGS OF THE THIRD ACM WORKSHOP ON ATTRIBUTE-BASED ACCESS CONTROL (ABAC'18), 2018, : 1 - 12
  • [29] HGABAC: Towards a Formal Model of Hierarchical Attribute-Based Access Control
    Servos, Daniel
    Osborn, Sylvia L.
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 187 - 204
  • [30] Efficient attribute-based encryption with hidden access structures
    School of Communication and Information Engineering, Shanghai Univ., Shanghai
    200444, China
    Xi'an Dianzi Keji Daxue Xuebao, 3 (97-102):