CIPHERTEXT-POLICY ATTRIBUTE BASED ENCRYPTION WITH SELECTIVELY-HIDDEN ACCESS POLICY

被引:5
|
作者
Arkin, Gulmire [1 ,2 ]
Helil, Nurmamat [1 ]
机构
[1] Xinjiang Univ, Coll Math & Syst Sci, Urumqi, Peoples R China
[2] Xinjiang Inst Technol, Coll Sci, Urumqi, Peoples R China
基金
中国国家自然科学基金;
关键词
CP-ABE; sensitive attribute selection; partial attribute hidden; EFFICIENT;
D O I
10.31577/cai_2021_5_1136
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In conventional Ciphertext-Policy Attribute-Based Encryption (CP-ABE), the access policy appears in plaintext form that might reveal confidential user information and violate user privacy. CP-ABE with hidden access policies hides all attributes, but the computational burden increases due to the attribute hiding. In this paper, we present a Linear Secret Sharing Scheme (LSSS) access structure CP-ABE scheme that hides only sensitive attributes, rather than all attributes, in the access policy. We also provide an attribute selection method to choose these sensitive attributes and use an Attribute Bloom Filter (ABF) to hide them. Compared with the existing major CP-ABE schemes with hidden access policies, our proposed scheme is flexible in selecting attributes to hide. This scheme enhances the efficiency of policy hiding while still protecting policy privacy. Test results show that our approach is reasonable and feasible.
引用
收藏
页码:1136 / 1159
页数:24
相关论文
共 50 条
  • [1] Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
    Li, Jiguo
    Wang, Haiping
    Zhang, Yichen
    Shen, Jian
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 3339 - 3352
  • [2] Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
    Yin, Hongjian
    Zhang, Leyou
    Cui, Yilei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (05): : 2768 - 2780
  • [3] Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update
    Jiang, Yinhao
    Susilo, Willy
    Mu, Yi
    Guo, Fuchun
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 39 - 60
  • [4] Hidden Policy Ciphertext-policy Attribute Based Encryption with Conjunctive Keyword Search
    Sun, Lixue
    Xu, Chunxiang
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 1439 - 1443
  • [5] Outsourced ciphertext-policy attribute-based encryption with partial policy hidden
    Yu, Jinxia
    He, Guanghui
    Yan, Xixi
    Tang, Yongli
    Qin, Rongxia
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (05)
  • [6] Dynamic Ciphertext-Policy Attribute-Based Encryption for Expressive Access Policy
    Rao, Y. Sreenivasa
    Dutta, Ratna
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2014, 2014, 8337 : 275 - 286
  • [7] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [8] Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment
    Nayudu P.P.
    Sekhar K.R.
    Computer Systems Science and Engineering, 2023, 46 (01): : 1079 - 1092
  • [9] Ciphertext-Policy Attribute-Based Encryption with Hiding Access Structure
    Yadav, Umesh Chandra
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 23 - 27
  • [10] On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption
    Zhou, Zhibin
    Huang, Dijiang
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 753 - 755