×

zbMATH — the first resource for mathematics

Computational friendly attribute-based encryptions with short ciphertext. (English) Zbl 1367.94341
Summary: We propose two Key-Policy Attribute-Based Encryption (KP-ABE) schemes for Linear Secret-Sharing Scheme (LSSS)-realizable Monotone Access Structure (MAS). We show that the first construction is secure against Chosen Plaintext Attacks (CPAs) while the second scheme is secure against Chosen Ciphertext Attacks (CCAs), without introducing any random oracle heuristic. Both the schemes enjoy constant-size ciphertext, constant number of pairing operations, and constant computation cost during encryption and decryption. We further propose two non-monotone access structure variants, one is CPA secure and another is CCA secure, preserving the same functionality as that of MAS primitives. We thereafter present a large attribute universe KP-ABE for MAS, still utilizing low computation cost together with constant number of pairing operations and public parameters. Unlike the existing approaches, this does not impose a bound on the size of attribute sets used in encryption, however, the security is in random oracle model. Our final result is a dual-policy ABE supporting LSSS-realizable MAS with significantly low communication and computation cost. Furthermore, we extend our KP-ABE to efficient key-policy attribute-based broadcast encryption. While the secret key in all our constructions has quadratic-size in the number of attributes, the number of pairing evaluations is constant. The CPA and CCA security against selective-adversary of proposed schemes are achieved under the decisional Bilinear Diffie-Hellman Exponent assumption over prime order groups.

MSC:
94A60 Cryptography
94A62 Authentication, digital signatures and secret sharing
PDF BibTeX XML Cite
Full Text: DOI
References:
[1] Attrapadung, N.; Herranz, J.; Laguillaumie, F.; Libert, B.; de Panafieu, E.; Ràfols, C., Attribute-based encryption schemes with constant-size ciphertexts, Theoret. Comput. Sci., 422, 15-38, (2012) · Zbl 1259.94043
[2] Attrapadung, N.; Imai, H., Conjunctive broadcast and attribute-based encryption, (Pairing-Based Cryptography - Pairing 2009, Lecture Notes in Computer Science, vol. 5671, (2009)), 248-265 · Zbl 1248.94050
[3] Attrapadung, N.; Imai, H., Dual-policy attribute based encryption, (Applied Cryptography and Network Security, Lecture Notes in Computer Science, vol. 5536, (2009)), 168-185
[4] Bethencourt, J.; Sahai, A.; Waters, B., Ciphertext-policy attribute-based encryption, (IEEE Symposium on Security and Privacy, 2007, SP ’07, (2007)), 321-334
[5] Boneh, D.; Boyen, X., Efficient selective-id secure identity-based encryption without random oracles, (Advances in Cryptology - EUROCRYPT 2004, Lecture Notes in Computer Science, vol. 3027, (2004)), 223-238 · Zbl 1122.94355
[6] Boneh, D.; Franklin, M., Identity-based encryption from the Weil pairing, (Advances in Cryptology — CRYPTO 2001, Lecture Notes in Computer Science, vol. 2139, (2001)), 213-229 · Zbl 1002.94023
[7] Boneh, D.; Gentry, C.; Waters, B., Collusion resistant broadcast encryption with short ciphertexts and private keys, (Advances in Cryptology - CRYPTO 2005, Lecture Notes in Computer Science, vol. 3621, (2005)), 258-275 · Zbl 1145.94434
[8] Boneh, D.; Waters, B., Conjunctive, subset, and range queries on encrypted data, (Theory of Cryptography, Lecture Notes in Computer Science, vol. 4392, (2007)), 535-554 · Zbl 1156.94335
[9] Canetti, R.; Halevi, S.; Katz, J., Chosen-ciphertext security from identity-based encryption, (Advances in Cryptology - EUROCRYPT 2004, Lecture Notes in Computer Science, vol. 3027, (2004)), 207-222 · Zbl 1122.94358
[10] Chase, M., Multi-authority attribute based encryption, (Proceedings of the 4th Conference on Theory of Cryptography, TCC’07, (2007)), 515-534 · Zbl 1156.94339
[11] Chen, C.; Zhang, Z.; Feng, D., Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost, (Provable Security, Lecture Notes in Computer Science, vol. 6980, (2011)), 84-101 · Zbl 1298.94083
[12] Cheung, L.; Newport, C., Provably secure ciphertext policy ABE, (Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS ’07, (2007), ACM), 456-465
[13] Emura, K.; Miyaji, A.; Nomura, A.; Omote, K.; Soshi, M., A ciphertext-policy attribute-based encryption scheme with constant ciphertext length, (Information Security Practice and Experience, Lecture Notes in Computer Science, vol. 5451, (2009)), 13-23
[14] Fujisaki, E.; Okamoto, T., How to enhance the security of public-key encryption at minimum cost, (Public Key Cryptography, Lecture Notes in Computer Science, vol. 1560, (1999)), 53-68 · Zbl 0964.94020
[15] Ge, A.; Zhang, R.; Chen, C.; Ma, C.; Zhang, Z., Threshold ciphertext policy attribute-based encryption with constant size ciphertexts, (Information Security and Privacy, Lecture Notes in Computer Science, vol. 7372, (2012)), 336-349 · Zbl 1308.94072
[16] Goyal, V.; Pandey, O.; Sahai, A.; Waters, B., Attribute-based encryption for fine-grained access control of encrypted data, (Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS ’06, (2006), ACM), 89-98
[17] Herranz, J.; Laguillaumie, F.; Ràfols, C., Constant size ciphertexts in threshold attribute-based encryption, (Public Key Cryptography - PKC 2010, Lecture Notes in Computer Science, vol. 6056, (2010)), 19-34 · Zbl 1271.94021
[18] Hohenberger, S.; Waters, B., Attribute-based encryption with fast decryption, (Kurosawa, K.; Hanaoka, G., Public-Key Cryptography - PKC 2013, Lecture Notes in Computer Science, vol. 7778, (2013), Springer Berlin, Heidelberg), 162-179 · Zbl 1314.94074
[19] Hur, J., Fine-grained data access control for distributed sensor networks, Wirel. Netw., 17, 1235-1249, (2011)
[20] Hur, J., Improving security and efficiency in attribute-based data sharing, IEEE Trans. Knowl. Data Eng., 25, 2271-2282, (2013)
[21] Hur, J.; Noh, D. K., Attribute-based access control with efficient revocation in data outsourcing systems, IEEE Trans. Parallel Distrib. Syst., 22, 1214-1221, (2011)
[22] Ibraimi, L.; Tang, Q.; Hartel, P.; Jonker, W., Efficient and provable secure ciphertext-policy attribute-based encryption schemes, (Proceedings of the 5th International Conference on Information Security Practice and Experience, ISPEC ’09, (2009)), 1-12
[23] Katz, J.; Sahai, A.; Waters, B., Predicate encryption supporting disjunctions, polynomial equations, and inner products, J. Cryptology, 26, 191-224, (2013) · Zbl 1279.94091
[24] Lai, J.; Deng, R.; Liu, S.; Kou, W., Efficient CCA-secure pke from identity-based techniques, (Topics in Cryptology - CT-RSA 2010, Lecture Notes in Computer Science, vol. 5985, (2010)), 132-147 · Zbl 1272.94047
[25] Lewko, A.; Okamoto, T.; Sahai, A.; Takashima, K.; Waters, B., Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption, (Advances in Cryptology - EUROCRYPT 2010, Lecture Notes in Computer Science, vol. 6110, (2010)), 62-91 · Zbl 1279.94095
[26] Lewko, A.; Sahai, A.; Waters, B., Revocation systems with very small private keys, (2010 IEEE Symposium on Security and Privacy (SP), (2010)), 273-285
[27] Lewko, A.; Waters, B., Decentralizing attribute-based encryption, (Advances in Cryptology - EUROCRYPT 2011, Lecture Notes in Computer Science, vol. 6632, (2011)), 568-588 · Zbl 1290.94106
[28] Lewko, A.; Waters, B., Unbounded HIBE and attribute-based encryption, (Advances in Cryptology - EUROCRYPT 2011, Lecture Notes in Computer Science, vol. 6632, (2011)), 547-567 · Zbl 1290.94105
[29] Miyaji, A.; Tran, P., Constant-ciphertext-size dual policy attribute based encryption, (Cyberspace Safety and Security, Lecture Notes in Computer Science, vol. 7672, (2012)), 400-413
[30] Müller, S.; Katzenbeisser, S.; Eckert, C., Distributed attribute-based encryption, (Information Security and Cryptology - ICISC 2008, Lecture Notes in Computer Science, vol. 5461, (2009)), 20-36
[31] Natarajan, V.; Yang, Y.; Zhu, S., Secure trust metadata management for mobile ad-hoc networks, (Information Systems Security, Lecture Notes in Computer Science, vol. 7671, (2012)), 164-180
[32] Okamoto, T.; Takashima, K., Fully secure functional encryption with general relations from the decisional linear assumption, (Advances in Cryptology - CRYPTO 2010, Lecture Notes in Computer Science, vol. 6223, (2010)), 191-208 · Zbl 1280.94086
[33] Ostrovsky, R.; Sahai, A.; Waters, B., Attribute-based encryption with non-monotonic access structures, (Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS ’07, (2007), ACM), 195-203
[34] Qin, B.; Wu, Q.; Zhang, L.; Domingo-Ferrer, J., Threshold public-key encryption with adaptive security and short ciphertexts, (Information and Communications Security, Lecture Notes in Computer Science, vol. 6476, (2010)), 62-76 · Zbl 1295.94134
[35] Rao, Y. S.; Dutta, R., Attribute-based key-insulated signature for Boolean formula, Int. J. Comput. Math., 93, 6, 864-888, (2016) · Zbl 1383.94043
[36] Rao, Y. S.; Dutta, R., Computationally efficient dual-policy attribute based encryption with short ciphertext, (Provable Security, Lecture Notes in Computer Science, vol. 8209, (2013)), 288-308 · Zbl 1318.94075
[37] Rao, Y. S.; Dutta, R., Computationally efficient expressive key-policy attribute based encryption schemes with constant-size ciphertext, (Information and Communications Security, Lecture Notes in Computer Science, vol. 8233, (2013)), 346-362 · Zbl 1346.94122
[38] Y. Rouselakis, B. Waters, New constructions and proof methods for large universe attribute-based encryption, IACR Cryptology ePrint Archive 2012 (2012) 583.
[39] Sahai, A.; Waters, B., Fuzzy identity-based encryption, (Advances in Cryptology - EUROCRYPT 2005, Lecture Notes in Computer Science, vol. 3494, (2005)), 457-473 · Zbl 1137.94355
[40] Tan, Y.-L.; Goi, B.-M.; Komiya, R.; Tan, S.-Y., A study of attribute-based encryption for body sensor networks, Informatics Engineering and Information Science, Commun. Comput. Inf. Sci., 251, 238-247, (2011)
[41] Wang, C.-J.; Luo, J.-F., A key-policy attribute-based encryption scheme with constant size ciphertext, (2012 Eighth International Conference on Computational Intelligence and Security, CIS, (2012)), 447-451
[42] Waters, B., Efficient identity-based encryption without random oracles, (Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques, EUROCRYPT’05, (2005)), 114-127 · Zbl 1137.94360
[43] Waters, B., Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization, (Public Key Cryptography - PKC 2011, Lecture Notes in Computer Science, vol. 6571, (2011)), 53-70 · Zbl 1291.94165
[44] Yamada, S.; Attrapadung, N.; Hanaoka, G.; Kunihiro, N., Generic constructions for chosen-ciphertext secure attribute based encryption, (Public Key Cryptography - PKC 2011, Lecture Notes in Computer Science, vol. 6571, (2011)), 71-89 · Zbl 1291.94170
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.