An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length

@article{Wang2013AnEK,
  title={An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length},
  author={Chang-ji Wang and Jian-Fa Luo},
  journal={Mathematical Problems in Engineering},
  year={2013},
  volume={2013},
  pages={1-7}
}
There is an acceleration of adoption of cloud computing among enterprises. However, moving the infrastructure and sensitive data from trusted domain of the data owner to public cloud will pose severe security and privacy risks. Attribute-based encryption (ABE) is a new cryptographic primitive which provides a promising tool for addressing the problem of secure and fine-grained data sharing and decentralized access control. Key-policy attribute-based encryption (KP-ABE) is an important type of… 

Tables from this paper

A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function
TLDR
A new cryptographic primitive called ciphertext-policy attribute-based encryption scheme with keyword search function (KSF-CP-ABE) to simultaneously solve above issues and is secure against both outer attacks and inner attacks.
Key-Policy Attribute-Based Encryption With Equality Test in Cloud Computing
TLDR
For the first time, the security model of authorization is provided, and the security of authorization based on the tDBDH assumption is proven in the random oracle model.
Simplified ciphertext-policy attribute-based encryption scheme with attribute level collusion resistance for cloud storage
TLDR
Simplified CP-ABE makes it easier to secure, broadcast and control the access of sensitive information, specifically across the cloud’s server and decrease collision resistance.
KEY-POLICY ATTRIBUTE BASED ENCRYPTION TO SECURE DATA STORED IN CLOUD
TLDR
A new cryptosystem for fine-grained sharing of reencrypted data that is based on Key-Policy Attribute-Based Encryption (KP-ABE), which supports delegation of private keys which subsumes Hierarchical Identity-Based Re-Encryption (HIBR).
TECHNOLOGY A SURVEY ON ATTRIBUTE BASED ENCRYPTION TECHNIQUES IN CLOUD COMPUTING
TLDR
Attribute-Based Encryption is a public key based encryption that enables access control over encrypted data using access policies and ascribed attributes and possible solutions for their limitations that consist of Attribute Based Encryption (ABE), CP-ABe, HABE, MA- ABE, KP-ABE.
Large Universe Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation
TLDR
A large universe ciphertextpolicy attribute based encryption (ABE) scheme with efficient revocation with divide the master key into two parts: delegation key and secret key, which are sent to the cloud provider and user separately.
Transformation between Attribute-Based Encryption and Key-Aggregate Cryptosystem
TLDR
This manuscript gives a bi-directional conversion between a key-aggregate cryptosystem and akey-policy attribute-based encryption with OR-gate-only access structures and gives a generic construction of a ciphertext-policyattribute-based key encapsulation mechanism (CP-ABKEM), which can be constructed with constant-size private keys.
A Novel method to represent Access Tree structure by Context Free Grammar with and-or graph in Key Policy based Attribute based Encryption
TLDR
This paper uses a probabilistic context free grammar with an And-Or structure to represent access control structure, which has high expressive power henceAccess control structure can be represented in an efficient manner.
Secure Data Storage in Cloud by using Assymetric Key Management based Encryption
TLDR
This work develops a new methodology for fine grained sharing of re-encrypted data that it calls Key-Policy Attribute Based Encryption (KP-ABE), and shows that the proposed scheme is highly efficient and secure.
Scalable and efficient attribute based encryption scheme for point to multi-point communication in cloud computing
TLDR
A scalable and efficient CP-ABE scheme that groups users in a relative order depending upon their common attributes and stores it in the form of user attribute relationship table over the cloud server, which has better efficiency and performance measure than existing techniques comparatively.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 15 REFERENCES
Attribute based data sharing with attribute revocation
TLDR
This paper uniquely integrates the technique of proxy re-encryption with CP-ABE, and enables the authority to delegate most of laborious tasks to proxy servers, and shows that the proposed scheme is provably secure against chosen ciphertext attacks.
Provably secure ciphertext policy ABE
TLDR
The basic scheme is proven to be chosen plaintext (CPA) secure under the decisional bilinear Diffie-Hellman (DBDH) assumption and the Canetti-Halevi-Katz technique is applied to obtain a chosen ciphertext (CCA) secure extension using one-time signatures.
Constant Size Ciphertexts in Threshold Attribute-Based Encryption
TLDR
This paper proposes the first scheme whose ciphertexts have constant size and works for the threshold case, and can be proven in the standard model by reduction to the augmented multi-sequence of exponents decisional Diffie-Hellman (aMSE-DDH) problem.
Bounded Ciphertext Policy Attribute Based Encryption
TLDR
This work presents the first construction of a ciphertext-policy attribute based encryption scheme having a security proof based on a number theoretic assumption and supporting advanced access structures and support access structures which can be represented by a bounded size access tree with threshold gates as its nodes.
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
  • Brent Waters
  • Computer Science, Mathematics
    Public Key Cryptography
  • 2011
We present a new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE) under concrete and noninteractive cryptographic assumptions in the standard model. Our solutions allow any
Attribute-based encryption for fine-grained access control of encrypted data
TLDR
This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption.
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
TLDR
The number of additional bits required from chosen plain text attack-secure CP-ABE to chosen ciphertext attack- secure CP- ABE is reduced by 90% with respect to that of the previous scheme.
Ciphertext-Policy Attribute-Based Encryption
TLDR
A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Attribute-based encryption with non-monotonic access structures
TLDR
An Attribute-Based Encryption scheme that allows a user's private key to be expressed in terms of any access formula over attributes based on the Decisional Bilinear Diffie-Hellman (BDH) assumption is constructed.
...
1
2
...