DOI QR코드

DOI QR Code

ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION

  • Published : 2009.07.31

Abstract

In classical encryption schemes, data is encrypted under a single key that is associated with a user or group. In Ciphertext-Policy Attribute-Based Encryption(CP-ABE) keys are associated with attributes of users, given to them by a central trusted authority, and data is encrypted under a logical formula over these attributes. We extend this idea to the case where an arbitrary number of independent parties can be present to maintain attributes and their corresponding secret keys. We present a scheme for multi-authority CP-ABE, propose the first two constructions that fully implement the scheme, and prove their security against chosen plaintext attacks.

References

  1. A. Beimel, Secure schemes for secret sharing and key distribution, Ph. D. thesis, Dept. of Computer Science, Technion, 1996
  2. J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attribute-based encryption, IEEE Symposium on Security and Privacy, 321–334, 2007 https://doi.org/10.1109/SP.2007.11
  3. D. Boneh, A brief look at pairings based cryptography, FOCS, 19–26, IEEE Computer Society, 2007 https://doi.org/10.1109/FOCS.2007.5
  4. D. Boneh and X. Boyen, Short signatures without random oracles and the SDH assumption in bilinear groups, J. Cryptology 21 (2008), no. 2, 149–177 https://doi.org/10.1007/s00145-007-9005-7
  5. M. Chase, Multi-authority attribute based encryption, Theory of cryptography, 515–534, Lecture Notes in Comput. Sci., 4392, Springer, Berlin, 2007 https://doi.org/10.1007/978-3-540-70936-7_28
  6. L. Cheung and C. C. Newport, Provably secure ciphertext policy ABE, ACM Conference on Computer and Communications Security (Peng Ning, Sabrina De Capitani di Vimercati, and Paul F. Syverson, eds.), 456–465, ACM, 2007 https://doi.org/10.1145/1315245.1315302
  7. S. D. Galbraith, K. G. Paterson, and N. P. Smart, Pairings for cryptographers, Discrete Appl. Math. 156 (2008), no. 16, 3113–3121 https://doi.org/10.1016/j.dam.2007.12.010
  8. V. Goyal, A. Jain, O. Pandey, and A. Sahai, Bounded ciphertext policy attribute based encryption, ICALP, 2008
  9. V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for finegrained access control of encrypted data, ACM Conference on Computer and Communications Security (Ari Juels, Rebecca N. Wright, and Sabrina De Capitani di Vimercati, eds.), 89–98, ACM, 2006 https://doi.org/10.1145/1180405.1180418
  10. S. Muller, S. Katzenbeisser, and C. Eckert, Distributed attribute-based encryption, 11th International Conference on Information Security and Cryptology, 2008, to appear https://doi.org/10.1007/978-3-642-00730-9_2
  11. A. Sahai and B. Waters, Fuzzy identity-based encryption, Advances in cryptology-EUROCRYPT 2005, 457–473, Lecture Notes in Comput. Sci., 3494, Springer, Berlin, 2005 https://doi.org/10.1007/11426639_27
  12. V. Shoup, Lower bounds for discrete logarithms and related problems, Advances in cryptology-EUROCRYPT '97 (Konstanz), 256–266, Lecture Notes in Comput. Sci., 1233, Springer, Berlin, 1997 https://doi.org/10.1007/3-540-69053-0_18
  13. D. R. Stinson, An explication of secret sharing schemes, Des. Codes Cryptography 2 (1992), no. 4, 357–390 https://doi.org/10.1007/BF00125203
  14. B. Waters, Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, Tech. report, SRI International, 2008, work in progress

Cited by

  1. SDSS-MAC: Secure data sharing scheme in multi-authority cloud storage systems vol.62, 2016, https://doi.org/10.1016/j.cose.2016.07.007
  2. A Survey of Research Progress and Development Tendency of Attribute-Based Encryption vol.2014, 2014, https://doi.org/10.1155/2014/193426
  3. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption vol.23, pp.11, 2012, https://doi.org/10.1109/TPDS.2012.50
  4. Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption vol.8, pp.18, 2015, https://doi.org/10.1002/sec.1326
  5. Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption vol.7, pp.11, 2014, https://doi.org/10.1002/sec.913
  6. A novel approach for privacy homomorphism using attribute-based encryption vol.9, pp.17, 2016, https://doi.org/10.1002/sec.1620
  7. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption vol.10, pp.1, 2015, https://doi.org/10.1109/TIFS.2014.2368352
  8. Large universe decentralized key-policy attribute-based encryption vol.8, pp.3, 2015, https://doi.org/10.1002/sec.997
  9. Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation pp.15320626, 2018, https://doi.org/10.1002/cpe.4678
  10. Light weight and fine-grained access mechanism for secure access to outsourced data* pp.15320626, 2018, https://doi.org/10.1002/cpe.4736
  11. A Novel Authorization Scheme for Multimedia Social Networks Under Cloud Storage Method by Using MA-CP-ABE vol.8, pp.3, 2018, https://doi.org/10.4018/IJCAC.2018070103