Attribute-based encryption with adaptive policy

被引:0
|
作者
Yiliang Han
机构
[1] Engineering University of PAP,Department of Electronic Technology
[2] State Key Laboratory of Cryptology,undefined
来源
Soft Computing | 2019年 / 23卷
关键词
Attribute-based encryption; Ciphertext policy; Key policy; Dual policy; Adaptive policy;
D O I
暂无
中图分类号
学科分类号
摘要
For the fine-grained data access control, attribute-based encryption (ABE) has become one of the potential components to secure cloud storage and social networks, in which the ciphertext is decrypted by the users with specific attributes instead of the unique identity. According to the access policy, ABE can be classified into three classes: ciphertext-policy (CP) ABE, key-policy (KP) ABE, and dual-policy (DP) ABE, which are, respectively, used to control attributes of data, attributes of users, and both of them. But when multiple requirements coexist, none of the three access policies could be applied directly. The paper proposed the new primitive called generalized policy attribute-based encryption (GP-ABE) firstly. A GP-ABE scheme based on bilinear pairing is designed also. In the proposal, the access structure is set by an identification function. Therefore, it could give different access policies according to different requirements adaptively, i.e., it gives the separate or combined access control on data attribute, user attribute, and both of them. Compared with the existing CP-ABE, KP-ABE, and DP-ABE, GP-ABE presents adaptive access policy while avoiding the additional cost. The proposed scheme is proved to be secure under selective attribute set attacks with q-bilinear Diffie–Hellman exponent assumption.
引用
收藏
页码:4009 / 4017
页数:8
相关论文
共 50 条
  • [1] Attribute-based encryption with adaptive policy
    Han, Yiliang
    SOFT COMPUTING, 2019, 23 (12) : 4009 - 4017
  • [2] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [3] Attribute-based encryption
    Sahai, Amit
    Waters, Brent
    Lu, Steve
    Cryptology and Information Security Series, 2009, 2 : 156 - 168
  • [4] Accountable authority key policy attribute-based encryption
    WANG YongTao 1
    2 China Information Technology Security Evaluation Center
    3 Shanghai Key Laboratory of Scalable Computing and Systems
    4 State Key Laboratory of Information Security
    Science China(Information Sciences), 2012, 55 (07) : 1631 - 1638
  • [5] Ciphertext Policy-Hiding Attribute-Based Encryption
    Yadav, Umesh Chandra
    Ali, Syed Taqi
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 2067 - 2071
  • [6] Accountable authority key policy attribute-based encryption
    Wang YongTao
    Chen KeFei
    Long Yu
    Liu ZhaoHui
    SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (07) : 1631 - 1638
  • [7] A Key-Policy Attribute-Based Broadcast Encryption
    Sun, Jin
    Hu, Yupu
    Zhang, Leyou
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (05) : 444 - 452
  • [8] Ciphertext-policy attribute-based delay encryption
    Chen, Lijiao
    Lv, Kewei
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (02) : 167 - 185
  • [9] Accountable authority key policy attribute-based encryption
    YongTao Wang
    KeFei Chen
    Yu Long
    ZhaoHui Liu
    Science China Information Sciences, 2012, 55 : 1631 - 1638
  • [10] Ciphertext Policy Attribute-Based Encryption from Lattices
    Zhang, Jiang
    Zhang, Zhenfeng
    Ge, Aijun
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,