JOURNAL BROWSE
Search
Advanced SearchSearch Tips
ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION
Muller, Sascha; Katzenbeisser, Stefan; Eckert, Claudia;
  PDF(new window)
 Abstract
In classical encryption schemes, data is encrypted under a single key that is associated with a user or group. In Ciphertext-Policy Attribute-Based Encryption(CP-ABE) keys are associated with attributes of users, given to them by a central trusted authority, and data is encrypted under a logical formula over these attributes. We extend this idea to the case where an arbitrary number of independent parties can be present to maintain attributes and their corresponding secret keys. We present a scheme for multi-authority CP-ABE, propose the first two constructions that fully implement the scheme, and prove their security against chosen plaintext attacks.
 Keywords
attribute-based encryption;bilinear groups;
 Language
English
 Cited by
1.
SDSS-MAC: Secure data sharing scheme in multi-authority cloud storage systems, Computers & Security, 2016, 62, 193  crossref(new windwow)
2.
A Survey of Research Progress and Development Tendency of Attribute-Based Encryption, The Scientific World Journal, 2014, 2014, 1  crossref(new windwow)
3.
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption, IEEE Transactions on Parallel and Distributed Systems, 2012, 23, 11, 2150  crossref(new windwow)
4.
Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption, Security and Communication Networks, 2015, 8, 18, 4098  crossref(new windwow)
5.
Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption, Security and Communication Networks, 2014, 7, 11, 1988  crossref(new windwow)
6.
A novel approach for privacy homomorphism using attribute-based encryption, Security and Communication Networks, 2016, 9, 17, 4451  crossref(new windwow)
7.
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption, IEEE Transactions on Information Forensics and Security, 2015, 10, 1, 190  crossref(new windwow)
8.
Large universe decentralized key-policy attribute-based encryption, Security and Communication Networks, 2015, 8, 3, 501  crossref(new windwow)
 References
1.
A. Beimel, Secure schemes for secret sharing and key distribution, Ph. D. thesis, Dept. of Computer Science, Technion, 1996

2.
J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attribute-based encryption, IEEE Symposium on Security and Privacy, 321–334, 2007 crossref(new window)

3.
D. Boneh, A brief look at pairings based cryptography, FOCS, 19–26, IEEE Computer Society, 2007 crossref(new window)

4.
D. Boneh and X. Boyen, Short signatures without random oracles and the SDH assumption in bilinear groups, J. Cryptology 21 (2008), no. 2, 149–177 crossref(new window)

5.
M. Chase, Multi-authority attribute based encryption, Theory of cryptography, 515–534, Lecture Notes in Comput. Sci., 4392, Springer, Berlin, 2007 crossref(new window)

6.
L. Cheung and C. C. Newport, Provably secure ciphertext policy ABE, ACM Conference on Computer and Communications Security (Peng Ning, Sabrina De Capitani di Vimercati, and Paul F. Syverson, eds.), 456–465, ACM, 2007 crossref(new window)

7.
S. D. Galbraith, K. G. Paterson, and N. P. Smart, Pairings for cryptographers, Discrete Appl. Math. 156 (2008), no. 16, 3113–3121 crossref(new window)

8.
V. Goyal, A. Jain, O. Pandey, and A. Sahai, Bounded ciphertext policy attribute based encryption, ICALP, 2008

9.
V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for finegrained access control of encrypted data, ACM Conference on Computer and Communications Security (Ari Juels, Rebecca N. Wright, and Sabrina De Capitani di Vimercati, eds.), 89–98, ACM, 2006 crossref(new window)

10.
S. Muller, S. Katzenbeisser, and C. Eckert, Distributed attribute-based encryption, 11th International Conference on Information Security and Cryptology, 2008, to appear crossref(new window)

11.
A. Sahai and B. Waters, Fuzzy identity-based encryption, Advances in cryptology-EUROCRYPT 2005, 457–473, Lecture Notes in Comput. Sci., 3494, Springer, Berlin, 2005 crossref(new window)

12.
V. Shoup, Lower bounds for discrete logarithms and related problems, Advances in cryptology-EUROCRYPT '97 (Konstanz), 256–266, Lecture Notes in Comput. Sci., 1233, Springer, Berlin, 1997 crossref(new window)

13.
D. R. Stinson, An explication of secret sharing schemes, Des. Codes Cryptography 2 (1992), no. 4, 357–390 crossref(new window)

14.
B. Waters, Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, Tech. report, SRI International, 2008, work in progress