Extended Attribute Based Encryption for Private Information Retrieval

被引:0
|
作者
Yinan, Shan [1 ]
Cao, Zhenfu [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
关键词
attribute based encryption; information retrieval; hierarchical authorization;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Private information retrieval enables the sensitive data to be obtained only if the data authorizers allow the data receivers to access to the data. Sometimes the owners are of a group and there is no need for all members to authorize the receivers. Moreover, the right to authorize could be unequal for different authorizers in the group. In this paper, we first proposed a solution providing hierarchical authorization right of different owners of the data with an extension of attribute based encryption. This scheme uses an access structure to describe the hierarchical relations of the authorizers of the data, and also provides privacy for the data and authorizer as well as the security of anti-collusion attack. In addition, we proposed an improved scheme which allows the authorizers to specify the authorization to certain data instead of providing the access right to all data they are in charge. This scheme is more secure for achieving forward security and more practical.
引用
收藏
页码:923 / 928
页数:6
相关论文
共 50 条
  • [31] Attribute-based encryption
    Sahai, Amit
    Waters, Brent
    Lu, Steve
    Cryptology and Information Security Series, 2009, 2 : 156 - 168
  • [32] On Anonymous Attribute Based Encryption
    Chaudhari, Payal
    Das, Manik Lal
    Mathuria, Anish
    INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 378 - 392
  • [33] Survey of Attribute Based Encryption
    Qiao, Zhi
    Liang, Shuwen
    Davis, Spencer
    Jiang, Hai
    2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2014, : 89 - 94
  • [34] A Review on Attribute Based Encryption
    Chaudhari, Nikhil
    Saini, Mohit
    Kumar, Ashwin
    Priya, G.
    2016 8TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2016, : 380 - 385
  • [35] Private Information Retrieval with Partially Known Private Side Information
    Wei, Yi-Peng
    Banawan, Karim
    Ulukus, Sennur
    2018 52ND ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2018,
  • [36] Extended information retrieval model based on Markov network
    Zuo, Jiali
    Wang, Mingwen
    Wang, Xi
    1847, Press of Tsinghua University (45):
  • [37] Authenticated private information retrieval
    Colombo, Simone
    Nikitin, Kirill
    Corrigan-Gibbs, Henry
    Wu, David J.
    Ford, Bryan
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 3835 - 3851
  • [38] The Capacity of Private Information Retrieval
    Sun, Hua
    Jafar, Syed A.
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [39] Tutorial: Private Information Retrieval
    Henry, Ryan
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2608 - 2612
  • [40] Efficient private information retrieval
    Itoh, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (01): : 11 - 20