CIPHERTEXT-POLICY ATTRIBUTE BASED ENCRYPTION WITH SELECTIVELY-HIDDEN ACCESS POLICY

被引:5
|
作者
Arkin, Gulmire [1 ,2 ]
Helil, Nurmamat [1 ]
机构
[1] Xinjiang Univ, Coll Math & Syst Sci, Urumqi, Peoples R China
[2] Xinjiang Inst Technol, Coll Sci, Urumqi, Peoples R China
基金
中国国家自然科学基金;
关键词
CP-ABE; sensitive attribute selection; partial attribute hidden; EFFICIENT;
D O I
10.31577/cai_2021_5_1136
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In conventional Ciphertext-Policy Attribute-Based Encryption (CP-ABE), the access policy appears in plaintext form that might reveal confidential user information and violate user privacy. CP-ABE with hidden access policies hides all attributes, but the computational burden increases due to the attribute hiding. In this paper, we present a Linear Secret Sharing Scheme (LSSS) access structure CP-ABE scheme that hides only sensitive attributes, rather than all attributes, in the access policy. We also provide an attribute selection method to choose these sensitive attributes and use an Attribute Bloom Filter (ABF) to hide them. Compared with the existing major CP-ABE schemes with hidden access policies, our proposed scheme is flexible in selecting attributes to hide. This scheme enhances the efficiency of policy hiding while still protecting policy privacy. Test results show that our approach is reasonable and feasible.
引用
收藏
页码:1136 / 1159
页数:24
相关论文
共 50 条
  • [21] An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme with Policy Update
    Wang, Changji
    Yuan, Yuan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (02): : 1031 - 1041
  • [22] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    XU Peng
    TANG Yong
    JIANG Wenbin
    JIN Hai
    ZOU Deqing
    ChineseJournalofElectronics, 2014, 23 (04) : 655 - 660
  • [23] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    Xu Peng
    Tang Yong
    Jiang Wenbin
    Jin Hai
    Zou Deqing
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 655 - 660
  • [24] Ciphertext-policy attribute-based encryption with short keys
    Jiang, Wenbin, 1600, Chinese Institute of Electronics (23):
  • [25] Extending the Ciphertext-Policy Attribute Based Encryption Scheme for Supporting Flexible Access Control
    Lang, Bo
    Xu, Runhua
    Duan, Yawei
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 147 - 157
  • [26] Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    SENSORS, 2019, 19 (07)
  • [27] Securely outsourcing the ciphertext-policy attribute-based encryption
    Kim Thuat Nguyen
    Nouha Oualha
    Maryline Laurent
    World Wide Web, 2018, 21 : 169 - 183
  • [28] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
    Emura, Keita
    Miyaji, Atsuko
    Nomura, Akito
    Omote, Kazumasa
    Soshi, Masakazu
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 13 - +
  • [29] Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack
    Qiu, Shuo
    Liu, Jiqiang
    Shi, Yanfeng
    Zhang, Rui
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (05)
  • [30] Ciphertext-Policy Attribute-Based Encryption with Non-Monotonic Access Structure
    Jia Hong-Yong
    Chen Yue
    Mao Xiu-Qing
    Dou Rui-Yu
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL IV, 2010, : 484 - 487