XU Peng, TANG Yong, JIANG Wenbin, et al., “Ciphertext-Policy Attribute-Based Encryption with Short Keys,” Chinese Journal of Electronics, vol. 23, no. 4, pp. 655-660, 2014,
Citation: XU Peng, TANG Yong, JIANG Wenbin, et al., “Ciphertext-Policy Attribute-Based Encryption with Short Keys,” Chinese Journal of Electronics, vol. 23, no. 4, pp. 655-660, 2014,

Ciphertext-Policy Attribute-Based Encryption with Short Keys

Funds:  This work is supported by the National Natural Science Foundation of China (No.61100222) and the National Program on Key Basic Research Project (973 Program) (No.2014CB340600).
  • Received Date: 2013-08-01
  • Rev Recd Date: 2013-11-01
  • Publish Date: 2014-10-05
  • Ciphertext-policy attribute-based encryption (CP-ABE) allows a user with some attributes to decrypt the ciphertexts associated with these attributes. Though several CP-ABE schemes with the constant size ciphertext were proposed to reduce the communication cost, their master public and secret keys still have the size linear in the total number of attributes. These schemes are unpractical for the attribute-scalable and many-attributes scenario. A new CP-ABE scheme is proposed. Each attribute is mapped to a mathematical value by a combination method. The master public and secret keys of the proposed CP-ABE scheme have the size linear in the binary size of a hash function's range. It has the comparable performance with existing schemes in the aspects like the time costs of encryption and decryption, the expressiveness of access policy and the provable security.
  • loading
  • J. Bethencourt, A. Sahai and B. Waters, Ciphertext-policy attribute-based encryption, Proceedings of IEEE Symposium on Security and Privacy, California, Vol.41, No.2, pp.321-334, 2007.
    Yu Nenghai, Hao Zhuo, Xu Jiajia, Zhang Weiming and Zhang Chi, Review of cloud computing security, Acta Electronica Sinica, Vol.41, No.2, pp.371-381, 2013.
    Cheng Hongbing, Rong Chunming, Tan Zhenghua and Zeng Qingkai, Identity based encryption and biometric authentication scheme for secure data access in cloud computing, Chinese Journal of Electronics, Vol.21, No.2, pp.254-259, 2012.
    K. Emura, A. Miyaji, A. Nomura, K. Omote and M. Soshi, A ciphertext-policy attribute-based encryption scheme with constant ciphertext length, Proceedings of Information Security Practice and Experience, Xi'an, China, pp.13-23, 2009.
    Z. Zhou and D. Huang, On efficient ciphertext-policy attri-bute based encryption and broadcast encryption, available at http://eprint.iacr.org/2010/395, 2010.
    J. Herranz, F. Laguillaumie and C. Ráfols, Constant size ciphertexts in threshold attribute-based encryption, Proceedings of Public Key Cryptography, Paris, Springer, pp.19-34, 2010.
    C. Chen, Z. Zhang and D. Feng, Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost, Proceedings of Provable Security, Xi'an, Springer, pp.84-101, 2011.
    A. Sahai and B. Waters, Fuzzy identity-based encryption, Proceedings of Advances in Cryptology-Eurocrypt, Denmark, Springer, pp.457-473, 2005.
    V. Goyal, O. Pandey, A. Sahai and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM Conference on Computer and Commuications Security, New York, ACM, pp.89-98, 2006.
    L. Cheung and C-C. Newport, Provably secure ciphertext policy ABE, Proceedings of the 14th ACM conference on Computer and Communications Security, New York, ACM, pp.456-465, 2007.
    V. Goyal, A. Jain, O. Pandey and A. Sahai, Bounded ciphertext policy attribute based encryption, Proceedings of Automata, Languages and Programming, Reykjavik, Iceland, pp.579-591, 2008.
    T. Nishide, K. Yoneyama and K. Ohta, Attribute-based encryption with partially hidden encryptor-specified access structures, Proceedings of Applied Cryptography and Network Security, New York, Springer, pp.111-129, 2008.
    V. Daza, J. Herranz, P. Morillo and C. Ráfols, Extended access structures and their cryptographic applications, available at http://eprint.iacr.org/2008/502, 2008.
    B. Waters, Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, available at http://eprint.iacr.org/2008/290, 2008.
    J.Katz, A.Sahai and B.Waters, Predicate encryption supporting disjunctions, polynomial equations, and inner products, Proceedings of Adavances in Cryptology-Eurocrypt, Turkey, Springer, pp.146-162, 2008.
    C. Delerablée and D. Pointcheval, Dynamic threshold public-key encryption, Proceedings of Advances in Cryptology-Crypto, California, Springer, pp.317-334, 2008.
  • 加载中


    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (688) PDF downloads(2859) Cited by()
    Proportional views


    DownLoad:  Full-Size Img  PowerPoint