ZHAO Qianqian, ZHANG Yuqing, ZHANG Guanghua, et al., “Ciphertext-Policy Attribute Based Encryption Supporting Any Monotone Access Structures Without Escrow,” Chinese Journal of Electronics, vol. 26, no. 3, pp. 640-646, 2017, doi: 10.1049/cje.2017.04.002
Citation: ZHAO Qianqian, ZHANG Yuqing, ZHANG Guanghua, et al., “Ciphertext-Policy Attribute Based Encryption Supporting Any Monotone Access Structures Without Escrow,” Chinese Journal of Electronics, vol. 26, no. 3, pp. 640-646, 2017, doi: 10.1049/cje.2017.04.002

Ciphertext-Policy Attribute Based Encryption Supporting Any Monotone Access Structures Without Escrow

doi: 10.1049/cje.2017.04.002
Funds:  This work is supported by the National Natural Science Foundation of China (No.61572460, No.61272481), the National Key Research and Development Project (No.2016YFB0800703), Open Fund of Beijing Key Laboratory of IOT Information Security Technology (No.J6V0011104), the China Postdoctoral Science Foundation (No.2015M582622), the National Information Security Special Projects of National Development, the Reform Commission of China (No.(2012)1424), and the China 111 Project (No.B16037).
More Information
  • Corresponding author: WANG He (corresponding author) received the Ph.D. degree from Xidian University, China, in 2016. She is currently a teacher in School of Cyber Engineering, Xidian University, China. Her main research interests include cryptographic protocol, Quantum cryptography. (Email:wangh@nipc.org.cn)
  • Received Date: 2015-10-25
  • Rev Recd Date: 2016-09-27
  • Publish Date: 2017-05-10
  • Ciphertext policy attribute-based encryption (CP-ABE) is becoming a new primitive for finegrained access control. It neither produces multiple encrypted copies of the same data nor suffers from the severe burden of key distribution and management. The escrow problem that the central authority could decrypt any ciphertexts addressed to all the specific users is still a challenge for CP-ABE mechanism. One new CP-ABE scheme without escrow is proposed, and furthermore the proposed scheme achieves fully security in the standard model. The performance and security analysis results indicate that the proposed CP-ABE scheme is extremely appropriate for cloud storage system.
  • loading
  • W. Zhu, J. Yu, T. Wang, P. Zhang and W. Xie, "Efficient attribute-based encryption from R-LWE", Chinese Journal of Electronics, Vol.23, No.4, pp.778-782, 2014
    P. Xu, Y. Tang, W.B. Jiang, H. Jin and D.Q. Zou, "Ciphertextpolicy attribute-based encryption with short keys", Chinese Journal of Electronics, Vol.23, No.4, pp.655-660, 2014.
    A. Sahai and B. Waters, "Fuzzy identity-based encryption", Proceedings Advances in Cryptology-EUROCRYPT, Aarhus, Denmark, pp.457-473, 2005.
    V. Goyal, O. Pandey, A. Sahai and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data", Proceedings of ACM Conference Computer and Comm. Security, Alexandria, Virginia, USA, pp.89-98, 2006.
    J. Bethencourt, A. Sahai and B. Waters, "Ciphertext-policy attribute-based encryption",Proceeding of IEEE Symposium Security and Privacy, Oakland, California, USA, pp.321-334, 2007.
    B. Waters, "Ciphertext-policy attribute-based encryption:An expressive, efficient, and provably secure realization", Proceeding of Public Key Cryptography, Taormina, Italy, Vol.6571, pp.53-70, 2011.
    M. Chase, "Multi-authority attribute based encryption", Theory of Cryptography, Vol.4392, pp.515-534, 2007.
    V. Bozovic, D. Socek, R. Steinwandt and V.I. Villanyi, "Multiauthority attribute based encryption with honest-but-curious central authority", International Journal of Computer Mathematics, Vol.89, No.3, pp.268-283, 2012.
    H. Lin, Z.F. Cao, X.H. Liang and J. Shao, "Secure threshold multi-authority attribute based encryption without a central authority", IEEE INDOCRYPT, LNCS, Vol.5365, pp.426-436, 2008.
    J. Hur, "Improving security and efficiency in attribute-based data sharing", IEEE Transactions on Knowledge and Data Engineering, Vol.25, No.10, pp.2271-2282, 2013.
    J. Hur, D.Y. Koo, S.O. Hwang and K. Kang, "Removing escrow from ciphertext policy attribute-based encryption", Computers and Mathematics with Applications, Vol.65, No.9, pp.1310-1317, 2013.
    M. Belenkiy, J. Camenisch, M. Chase, M. Kohlweiss, A. Hysyans-kaya and H. Shacham, "Randomizable proofs and delegatable anonymous credentials", Proceeding of Advances in Cryptology-Crypto, Santa Barbara, California, USA, pp.108-125, 2009.
    A. Lewko, T. Okamoto, A. Sahai, K. Takashima and B. Waters, "Fully secure functional encryption:Attribute-based encryption and (hierarchical) inner product encryption", Proceedings Advances in Cryptology-EUROCRYPT, Riviera, French, pp.62-91, 2010.
    Z. Liu, Z. Cao and D.S. Wong, "White-box traceable ciphertextpolicy attribute-based encryption supporting any monotone access structures", IEEE Transactions on Information Forensics and Security, Vol.8, No.1, pp.76-88, 2013.
    Y.T. Wang, K.F. Chen and J.H. Chen, "Attribute-based traitor tracing", Journal of Information Science and Engineering, Vol.27, No.1, pp.181-195, 2011.
    A. Beimel, "Secure schemes for secret sharing and key distribution", Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel, 1996.
    D. Boneh, E. Goh and K. Nissim, "Evaluating 2-dnf formulas on ciphertexts", Proceedings of TCC, Cambridge, Massachusetts, USA, pp.325-342, 2005.
    A. Lewko and B. Waters, "New techniques for dual system encryption and fully secure hibe with short ciphertexts", Proceeding of TCC, Zurich, Switzerland, 2010.
    M. Chase and S.S.M. Chow, "Improving privacy and security in multi-authority attribute-based encryption", Proceeding of ACM Conference Computer and Communication Security, Chicago, Illinois, USA, pp.121-130, 2009.
    S.S.M. Chow, "Removing escrow from identity-based encryption", Proceeding of International Conference Practice and Theory in Public Key Cryptography, California, USA, pp.256-276, 2009.
    P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes", Proceedings Advances in CryptologyEUROCRYPT, Prague, Czech Republic, Vol.1592, pp.223-238, 1999.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (547) PDF downloads(744) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return