Attribute-based encryption with non-monotonic access structures

作者: Rafail Ostrovsky , Amit Sahai , Brent Waters

DOI: 10.1145/1315245.1315270

关键词: On-the-fly encryptionProbabilistic encryptionLink encryptionClient-side encryption56-bit encryptionDisk encryption theoryPublic-key cryptographyDisk encryption hardwareFunctional encryptionAttribute-based encryptionFilesystem-level encryption40-bit encryptionComputer scienceDeterministic encryptionPlaintext-aware encryptionMultiple encryptionTheoretical computer scienceEncryptionPredicate encryption

摘要: We construct an Attribute-Based Encryption (ABE) scheme that allows a user's private key to be expressed in terms of any access formula over attributes. Previous ABE schemes were limited to expressing only monotonic access structures. We provide a proof of security for our scheme based on the Decisional Bilinear Diffie-Hellman (BDH) assumption. Furthermore, the performance of our new scheme compares favorably with existing, less-expressive schemes.

参考文章(24)
Dan Boneh, Matthew Franklin, Identity-Based Encryption from the Weil Pairing SIAM Journal on Computing. ,vol. 32, pp. 586- 615 ,(2003) , 10.1137/S0097539701398521
Mitsuru Ito, Akira Saito, Takao Nishizeki, Secret sharing scheme realizing general access structure Electronics and Communications in Japan Part Iii-fundamental Electronic Science. ,vol. 72, pp. 56- 64 ,(1989) , 10.1002/ECJC.4430720906
Ran Canetti, Shai Halevi, Jonathan Katz, Chosen-Ciphertext Security from Identity-Based Encryption theory and application of cryptographic techniques. pp. 207- 222 ,(2004) , 10.1007/978-3-540-24676-3_13
Josh Benaloh, Jerry Leichter, Generalized secret sharing and monotone functions international cryptology conference. pp. 27- 35 ,(1990) , 10.1007/0-387-34799-2_3
Ling Cheung, Calvin Newport, Provably secure ciphertext policy ABE computer and communications security. pp. 456- 465 ,(2007) , 10.1145/1315245.1315302
John Bethencourt, Amit Sahai, Brent Waters, Ciphertext-Policy Attribute-Based Encryption ieee symposium on security and privacy. pp. 321- 334 ,(2007) , 10.1109/SP.2007.11
Dan Boneh, Xavier Boyen, Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles theory and application of cryptographic techniques. pp. 223- 238 ,(2004) , 10.1007/978-3-540-24676-3_14
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters, Attribute-based encryption for fine-grained access control of encrypted data Proceedings of the 13th ACM conference on Computer and communications security - CCS '06. pp. 89- 98 ,(2006) , 10.1145/1180405.1180418
Adi Shamir, How to share a secret Communications of the ACM. ,vol. 22, pp. 612- 613 ,(1979) , 10.1145/359168.359176
Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons, Concealing complex policies with hidden credentials computer and communications security. pp. 146- 157 ,(2004) , 10.1145/1030083.1030104