Key-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control

被引:0
|
作者
Liu, Ximeng [1 ]
Zhu, Hui [1 ]
Ma, Jianfeng [2 ]
Ma, Jun [2 ]
Ma, Siqi [3 ]
机构
[1] Xidian Univ, Sch Telecommun Engn, Xian, Peoples R China
[2] Xidian Univ, Sch Comp Sci & Technol, Xian, Peoples R China
[3] Singapore Management Univ, Sch Informat Syst, Singapore, Singapore
基金
中国国家自然科学基金;
关键词
Bilinear pairings; Attribute-based; Access structure; Weighted attribute; Encryption;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
When we step into the new internet era, large numbers of new techniques have emerged in order to make our life better. However, these new techniques require some new properties in order to keep personal information confidentially which the traditional encryption method cannot catch up with. Recently, a new encryption primitive called Attribute Based Encryption(ABE) have appeared because it can achieve both information security and fine-grained access control. Although the ABE scheme has these new characters which can keep the information security that can fit for the new widely used technique, nevertheless, the characteristic of attributes are treated in the identical level in most of traditional schemes. In the real scenario, the importance of each attributes is always different. In this paper, we propose a scheme called Key-Policy Weighted Attribute based Encryption (KP-WABE) while the attributes have different weights according to their importance in the system. The KP-WABE scheme is proved to be secure under the l-th Bilinear Diffie-Hellman Inversion Assumption. Our scheme can be considered as the generalization of traditional KP-ABE scheme when all attributes have equal weights.
引用
收藏
页码:694 / 699
页数:6
相关论文
共 50 条
  • [41] KEY-POLICY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR GENERAL CIRCUITS
    Bolocan, Diana
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2020, 21 (01): : 11 - 19
  • [42] Lattice-based public key searchable encryption with fine-grained access control for edge computing
    Wang, Peng
    Chen, Biwen
    Xiang, Tao
    Wang, Zhongming
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 127 : 373 - 383
  • [43] Fine-grained data access control with attribute-hiding policy for cloud-based IoT
    Hao, Jialu
    Huang, Cheng
    Ni, Jianbing
    Rong, Hong
    Xian, Ming
    Shen, Xuemin
    COMPUTER NETWORKS, 2019, 153 : 1 - 10
  • [44] Hierarchical Attribute-Based Encryption for Fine-Grained Access Controlin Cloud Storage Services
    Wang, Guojun
    Liu, Qin
    Wu, Jie
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 735 - 737
  • [45] Enhancing Lattice-Based Attribute-Based Encryption with Robust Fine-Grained Access Policies
    Khajouei-Nejad, Sedigheh
    Jabbehdari, Sam
    Javadi, Hamid Haj Seyyed
    Moattar, Seyed Mohammad Hossein
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 17 (01): : 13 - 23
  • [46] Oblivious Transfer with Fine Grained Access Control from Ciphertext Policy Attribute Based Encryption in the Standard Model
    Fu, Xingbing
    Li, Fagen
    Zeng, Shengke
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (01): : 285 - 302
  • [47] Key-Policy Attribute-Based Encryption With Equality Test in Cloud Computing
    Zhu, Huijun
    Wang, Licheng
    Ahmad, Haseeb
    Niu, Xinxin
    IEEE ACCESS, 2017, 5 : 20428 - 20439
  • [48] A Key-policy Attribute-based Encryption Scheme with Constant Size Ciphertext
    Wang, Chang-Ji
    Luo, Jian-Fa
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 447 - 451
  • [49] Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (11) : 2150 - 2162
  • [50] Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control
    Wang, Zhongming
    Chen, Biwen
    Xiang, Tao
    Zhou, Lu
    Yan, Hongyang
    Li, Jin
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021, 2021, 13059 : 3 - 18