Key-Policy Attribute-Based Encryption for Boolean Circuits from Bilinear Maps

被引:6
|
作者
Tiplea, Ferucio Laurentiu [1 ]
Dragan, Constantin Catalin [2 ]
机构
[1] Alexandru Ioan Cuza Univ, Dept Comp Sci, Iasi 700506, Romania
[2] CNRS, LORIA, F-54506 Vandoeuvre Les Nancy, France
来源
CRYPTOGRAPHY AND INFORMATION SECURITY IN THE BALKANS | 2015年 / 9024卷
关键词
D O I
10.1007/978-3-319-21356-9_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a Key-policy Attribute-based Encryption (KPABE) scheme for (monotone) Boolean circuits based on bilinear maps. The construction is based on secret sharing and just one bilinear map, and it is a proper extension of the KP-ABE scheme in [7] in the sense that it is practically efficient for a class of Boolean circuits which strictly includes all Boolean formulas. Selective security of the proposed scheme in the standard model is proved, and comparisons with the scheme in [5] based on leveled multilinear maps, are provided. Thus, for Boolean circuits representing multilevel access structures, our KP-ABE scheme is more efficient than the one in [5].
引用
收藏
页码:175 / 193
页数:19
相关论文
共 50 条
  • [31] A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles
    Ge, Chunpeng
    Susilo, Willy
    Wang, Jiandong
    Huang, Zhiqiu
    Fang, Liming
    Ren, Yongjun
    COMPUTER JOURNAL, 2016, 59 (07): : 970 - 982
  • [32] Scalable Key-Policy Attribute-Based Encryption under the Strictly Weaker Assumption Family
    Deng Y.-Q.
    Song G.
    Tang C.-M.
    Wen Y.-M.
    Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (04): : 883 - 895
  • [33] An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups
    Meng, Ru
    Zhou, Yanwei
    Ning, Jianting
    Liang, Kaitai
    Han, Jinguang
    Susilo, Willy
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 39 - 56
  • [34] A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks
    Wang, Qihua
    Yu, Chang Wu
    Li, Fagen
    Wang, Huaqun
    Cao, Lijie
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4138 - 4150
  • [35] Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Schemes with Fast Decryption
    Rao, Y. Sreenivasa
    INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 521 - 531
  • [36] Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme
    Ge, Aijun
    Zhang, Jiang
    Zhang, Rui
    Ma, Chuangui
    Zhang, Zhenfeng
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (11) : 2319 - 2321
  • [37] Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes
    Liu, Yuan
    Wang, Licheng
    Shen, Xiaoying
    Li, Lixiang
    An, Dezhi
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [38] Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    Zhou, Yunya
    COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 91 - 108
  • [39] Attribute-Based Encryption for Circuits
    Gorbunov, Sergey
    Vaikuntanathan, Vinod
    Wee, Hoeteck
    STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2013, : 545 - 554
  • [40] User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
    Rahulamathavan, Yogachandran
    Veluru, Suresh
    Han, Jinguang
    Li, Fei
    Rajarajan, Muttukrishnan
    Lu, Rongxing
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (09) : 2939 - 2946