Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization

作者: Brent Waters

DOI: 10.1007/978-3-642-19379-8_4

关键词: Provable securityCiphertextTheoretical computer scienceAccess structureCryptographyGeneric group modelStandard model (cryptography)Attribute-based encryptionMathematicsEncryption

摘要: We present a new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE) under concrete and noninteractive cryptographic assumptions in the standard model. Our solutions allow any encryptor to specify access control in terms of any access formula over the attributes in the system. In our most efficient system, ciphertext size, encryption, and decryption time scales linearly with the complexity of the access formula. The only previous work to achieve these parameters was limited to a proof in the generic group model. We …

参考文章(46)
Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters, Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption theory and application of cryptographic techniques. pp. 62- 91 ,(2010) , 10.1007/978-3-642-13190-5_4
L. Chen, K. Harrison, A. Moss, D. Soldera, N. P. Smart, Certification of Public Keys within an Identity Based System international conference on information security. pp. 322- 333 ,(2002) , 10.1007/3-540-45811-5_25
Amit Sahai, Brent Waters, Fuzzy identity-based encryption theory and application of cryptographic techniques. ,vol. 3494, pp. 457- 473 ,(2005) , 10.1007/11426639_27
Gerome Miklau, Dan Suciu, Controlling access to published data using cryptography very large data bases. pp. 898- 909 ,(2003) , 10.1016/B978-012722442-8/50084-7
Vipul Goyal, Abhishek Jain, Omkant Pandey, Amit Sahai, Bounded Ciphertext Policy Attribute Based Encryption Automata, Languages and Programming. pp. 579- 591 ,(2008) , 10.1007/978-3-540-70583-3_47
Nigel P. Smart, Access Control Using Pairing Based Cryptography Topics in Cryptology — CT-RSA 2003. pp. 111- 121 ,(2003) , 10.1007/3-540-36563-X_8
L. Chen, K. Harrison, D. Soldera, N. P. Smart, Applications of Multiple Trust Authorities in Pairing Based Cryptosystems Lecture Notes in Computer Science. pp. 260- 275 ,(2002) , 10.1007/3-540-45831-X_18
Craig Gentry, Practical Identity-Based Encryption Without Random Oracles Advances in Cryptology - EUROCRYPT 2006. pp. 445- 464 ,(2006) , 10.1007/11761679_27
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5
Jeremy Horwitz, Ben Lynn, Toward Hierarchical Identity-Based Encryption international cryptology conference. pp. 466- 481 ,(2002) , 10.1007/3-540-46035-7_31