Key-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control

被引:0
|
作者
Liu, Ximeng [1 ]
Zhu, Hui [1 ]
Ma, Jianfeng [2 ]
Ma, Jun [2 ]
Ma, Siqi [3 ]
机构
[1] Xidian Univ, Sch Telecommun Engn, Xian, Peoples R China
[2] Xidian Univ, Sch Comp Sci & Technol, Xian, Peoples R China
[3] Singapore Management Univ, Sch Informat Syst, Singapore, Singapore
基金
中国国家自然科学基金;
关键词
Bilinear pairings; Attribute-based; Access structure; Weighted attribute; Encryption;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
When we step into the new internet era, large numbers of new techniques have emerged in order to make our life better. However, these new techniques require some new properties in order to keep personal information confidentially which the traditional encryption method cannot catch up with. Recently, a new encryption primitive called Attribute Based Encryption(ABE) have appeared because it can achieve both information security and fine-grained access control. Although the ABE scheme has these new characters which can keep the information security that can fit for the new widely used technique, nevertheless, the characteristic of attributes are treated in the identical level in most of traditional schemes. In the real scenario, the importance of each attributes is always different. In this paper, we propose a scheme called Key-Policy Weighted Attribute based Encryption (KP-WABE) while the attributes have different weights according to their importance in the system. The KP-WABE scheme is proved to be secure under the l-th Bilinear Diffie-Hellman Inversion Assumption. Our scheme can be considered as the generalization of traditional KP-ABE scheme when all attributes have equal weights.
引用
收藏
页码:694 / 699
页数:6
相关论文
共 50 条
  • [31] Adaptable key-policy attribute-based encryption with time interval
    Siqi Ma
    Junzuo Lai
    Robert H. Deng
    Xuhua Ding
    Soft Computing, 2017, 21 : 6191 - 6200
  • [32] Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test
    Liao, Yongjian
    Chen, Hongjie
    Li, Fagen
    Jiang, Shaoquan
    Zhou, Shijie
    Mohammed, Ramadan
    IEEE ACCESS, 2018, 6 : 10189 - 10196
  • [33] Key-policy attribute-based encryption scheme for general circuits
    Hu P.
    Gao H.-Y.
    Ruan Jian Xue Bao/Journal of Software, 2016, 27 (06): : 1498 - 1510
  • [34] Blind expressive ciphertext policy attribute based encryption for fine grained access control on the encrypted data
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, No.2006 Xiyuan Avenue, West Hi-tech Zone, Chengdu
    611731, China
    不详
    Int. J. Netw. Secur., 6 (661-671):
  • [35] Key-Policy Attribute-Based Encryption Based on SM9
    Liu, Xiao-Hong
    Huang, Xin-Yi
    Wu, Wei
    Ning, Jian-Ting
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2025, 40 (01) : 267 - 282
  • [36] Key-Policy Attribute-Based Encryption from Bilinear Maps
    Tiplea, Ferucio Laurentiu
    Dragan, Constantin Catalin
    Nica, Anca-Maria
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATION: 10TH INTERNATIONAL CONFERENCE, SECITC 2017, 2017, 10543 : 28 - 42
  • [37] Efficient Revocable Key-Policy Attribute Based Encryption with Full Security
    Zhang, Fengli
    Li, Qinyi
    Xiong, Hu
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 477 - 481
  • [38] Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing
    Liu, Jun'e
    Wan, Zhiguo
    Gu, Ming
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 98 - 107
  • [39] An Attribute-Based Encryption Scheme with Revocation for Fine-Grained Access Control in Wireless Body Area Networks
    Tian, Ye
    Peng, Yanbin
    Peng, Xinguang
    Li, Hongbin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [40] Adaptable key-policy attribute-based encryption with time interval
    Ma, Siqi
    Lai, Junzuo
    Deng, Robert H.
    Ding, Xuhua
    SOFT COMPUTING, 2017, 21 (20) : 6191 - 6200