Levelled attribute-based encryption for hierarchical access control

被引:0
|
作者
Le, Huy Quoc [1 ]
Le, Phi Thuong [2 ]
Trinh, Sy Tuan [2 ]
Susilo, Willy [3 ]
Trinh, Viet Cuong [2 ]
机构
[1] Tan Tao Univ, Sch Informat Technol, Tan Tao Univ Ave, Duc Hoa 82700, Long An Provinc, Vietnam
[2] Hong Duc Univ, Fac Informat & Commun Technol, Dong Ve Ward, Quang Trung St, Thanh Hoa City 40130, Thanh Hoa Provi, Vietnam
[3] Univ Wollongong, Sch Informat Technol & Comp, Northfields Ave, Wollongong, NSW 2522, Australia
关键词
Levelled attribute-based encryption; Hierarchical attribute; Key-policy; Ciphertext-policy; Attribute-based encryption; PRIME-ORDER GROUPS;
D O I
10.1016/j.csi.2024.103957
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) is an important primitive to address the problem of flexible one-to-many encryption. Attribute-based encryption has found many practical applications such as cloud storage systems, file sharing systems, e-Health, pay-TV systems, social networks, etc. However, in almost existing ABE schemes, the efficiency depends heavily on the number of attributes involved in the secret key and the ciphertext. This makes hierarchical access control in ABE, where attributes need to be hierarchically organized, could be inefficient. This paper introduces a novel concept of Levelled Attribute-based Encryption (Levelled ABE) as a solution to address the inefficiencies of standard ABE for hierarchical access control systems, where scalability and key management are critical. Levelled ABE presents a hierarchical attribute framework where attributes are organized into classes, and each attribute is assigned a level number within its class. By introducing this hierarchical structure, Levelled ABE enables finer-grained access control, scalability and more efficient key management. As a proof of concept, this paper also proposes two concrete constructions of Levelled ABE, one for key-policy and the other for ciphertext-policy. These constructions are comparable to existing ABE schemes. The security of the proposed constructions is proved in the generic group model.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Blockchain empowered access control for digital twin system with attribute-based encryption
    Dai, Yueyue
    Wu, Jian
    Mao, Shuqi
    Rao, Xiaoyang
    Gu, Bruce
    Qu, Youyang
    Lu, Yunlong
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 160 : 564 - 576
  • [42] Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment
    Yan, Liang
    Ge, Lina
    Wang, Zhe
    Zhang, Guifen
    Xu, Jingya
    Hu, Zheng
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [43] Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment
    Liang Yan
    Lina Ge
    Zhe Wang
    Guifen Zhang
    Jingya Xu
    Zheng Hu
    Journal of Cloud Computing, 12
  • [44] Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption
    Li, Yang
    Qi, Baoyue
    Wang, Mengmeng
    Zhu, Jianming
    Wang, Xiuli
    DATA SCIENCE (ICPCSEE 2022), PT II, 2022, 1629 : 105 - 124
  • [45] Cloud Storage Data Access Control Scheme Based on Blockchain and Attribute-Based Encryption
    Yang, Xiaodong
    Chen, Aijia
    Wang, Zhisong
    Li, Shudong
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [46] Hierarchical Access Control Scheme of Private Data Based on Attribute Encryption
    Lin, Xi
    Han, Yiliang
    DATA SCIENCE, PT 1, 2017, 727 : 220 - 230
  • [47] Hierarchical Attribute-Based Encryption for Fine-Grained Access Controlin Cloud Storage Services
    Wang, Guojun
    Liu, Qin
    Wu, Jie
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 735 - 737
  • [48] Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
    Lewko, Allison
    Okamoto, Tatsuaki
    Sahai, Amit
    Takashima, Katsuyuki
    Waters, Brent
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 62 - +
  • [49] Attribute-Based Oblivious Access Control
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    COMPUTER JOURNAL, 2012, 55 (10): : 1202 - 1215
  • [50] Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things
    Ali, Mohammad
    Sadeghi, Mohammad-Reza
    Liu, Ximeng
    IEEE ACCESS, 2020, 8 : 23951 - 23964