Enhancing Attribute-Based Encryption with Attribute Hierarchy

作者: Jin Li , Qian Wang , Cong Wang , Kui Ren

DOI: 10.1007/S11036-010-0233-Y

关键词:

摘要: Attribute-based encryption (ABE) has been envisioned as a promising cryptographic primitive for realizing secure and flexible access control. However, ABE is being criticized its high scheme overhead extensive pairing operations are usually required. In this paper, we focus on improving the efficiency of by leveraging previously overlooked fact, i.e., often-found hierarchical relationships among attributes that inherent to many control scenarios. As first research effort along direction, coin notion (HABE), which can be viewed generalization traditional in sense both definitions equal when all independent. We further give concrete HABE construction considering tree hierarchy attributes, provably secure. More importantly, our exhibits significant improvements over attribute hierarchies exist.

参考文章(23)
Amit Sahai, Brent Waters, Fuzzy identity-based encryption theory and application of cryptographic techniques. ,vol. 3494, pp. 457- 473 ,(2005) , 10.1007/11426639_27
Vipul Goyal, Abhishek Jain, Omkant Pandey, Amit Sahai, Bounded Ciphertext Policy Attribute Based Encryption Automata, Languages and Programming. pp. 579- 591 ,(2008) , 10.1007/978-3-540-70583-3_47
Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta, Attribute-based encryption with partially hidden encryptor-specified access structures applied cryptography and network security. pp. 111- 129 ,(2008) , 10.1007/978-3-540-68914-0_7
Sean W. Smith, Apu Kapadia, Patrick P. Tsang, Attribute-Based Publishing with Hidden Credentials and Hidden Policies. network and distributed system security symposium. ,(2007)
Dan Boneh, Brent Waters, Conjunctive, Subset, and Range Queries on Encrypted Data Theory of Cryptography. pp. 535- 554 ,(2007) , 10.1007/978-3-540-70936-7_29
Brent Waters, Efficient identity-based encryption without random oracles theory and application of cryptographic techniques. ,vol. 3494, pp. 114- 127 ,(2005) , 10.1007/11426639_7
Jonathan Katz, Amit Sahai, Brent Waters, Predicate encryption supporting disjunctions, polynomial equations, and inner products international cryptology conference. pp. 146- 162 ,(2008) , 10.1007/978-3-540-78967-3_9
Eiichiro Fujisaki, Tatsuaki Okamoto, Secure Integration of Asymmetric and Symmetric Encryption Schemes international cryptology conference. pp. 537- 554 ,(1999) , 10.1007/3-540-48405-1_34
Shucheng Yu, Kui Ren, Wenjing Lou, Jin Li, Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems international conference on security and privacy in communication systems. ,vol. 19, pp. 311- 329 ,(2009) , 10.1007/978-3-642-05284-2_18
Melissa Chase, Multi-authority Attribute Based Encryption Theory of Cryptography. pp. 515- 534 ,(2007) , 10.1007/978-3-540-70936-7_28