• Published : 2009.07.31


In classical encryption schemes, data is encrypted under a single key that is associated with a user or group. In Ciphertext-Policy Attribute-Based Encryption(CP-ABE) keys are associated with attributes of users, given to them by a central trusted authority, and data is encrypted under a logical formula over these attributes. We extend this idea to the case where an arbitrary number of independent parties can be present to maintain attributes and their corresponding secret keys. We present a scheme for multi-authority CP-ABE, propose the first two constructions that fully implement the scheme, and prove their security against chosen plaintext attacks.


  1. A. Beimel, Secure schemes for secret sharing and key distribution, Ph. D. thesis, Dept. of Computer Science, Technion, 1996
  2. J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attribute-based encryption, IEEE Symposium on Security and Privacy, 321–334, 2007
  3. D. Boneh, A brief look at pairings based cryptography, FOCS, 19–26, IEEE Computer Society, 2007
  4. D. Boneh and X. Boyen, Short signatures without random oracles and the SDH assumption in bilinear groups, J. Cryptology 21 (2008), no. 2, 149–177
  5. M. Chase, Multi-authority attribute based encryption, Theory of cryptography, 515–534, Lecture Notes in Comput. Sci., 4392, Springer, Berlin, 2007
  6. L. Cheung and C. C. Newport, Provably secure ciphertext policy ABE, ACM Conference on Computer and Communications Security (Peng Ning, Sabrina De Capitani di Vimercati, and Paul F. Syverson, eds.), 456–465, ACM, 2007
  7. S. D. Galbraith, K. G. Paterson, and N. P. Smart, Pairings for cryptographers, Discrete Appl. Math. 156 (2008), no. 16, 3113–3121
  8. V. Goyal, A. Jain, O. Pandey, and A. Sahai, Bounded ciphertext policy attribute based encryption, ICALP, 2008
  9. V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for finegrained access control of encrypted data, ACM Conference on Computer and Communications Security (Ari Juels, Rebecca N. Wright, and Sabrina De Capitani di Vimercati, eds.), 89–98, ACM, 2006
  10. S. Muller, S. Katzenbeisser, and C. Eckert, Distributed attribute-based encryption, 11th International Conference on Information Security and Cryptology, 2008, to appear
  11. A. Sahai and B. Waters, Fuzzy identity-based encryption, Advances in cryptology-EUROCRYPT 2005, 457–473, Lecture Notes in Comput. Sci., 3494, Springer, Berlin, 2005
  12. V. Shoup, Lower bounds for discrete logarithms and related problems, Advances in cryptology-EUROCRYPT '97 (Konstanz), 256–266, Lecture Notes in Comput. Sci., 1233, Springer, Berlin, 1997
  13. D. R. Stinson, An explication of secret sharing schemes, Des. Codes Cryptography 2 (1992), no. 4, 357–390
  14. B. Waters, Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, Tech. report, SRI International, 2008, work in progress

Cited by

  1. SDSS-MAC: Secure data sharing scheme in multi-authority cloud storage systems vol.62, 2016,
  2. A Survey of Research Progress and Development Tendency of Attribute-Based Encryption vol.2014, 2014,
  3. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption vol.23, pp.11, 2012,
  4. Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption vol.8, pp.18, 2015,
  5. Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption vol.7, pp.11, 2014,
  6. A novel approach for privacy homomorphism using attribute-based encryption vol.9, pp.17, 2016,
  7. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption vol.10, pp.1, 2015,
  8. Large universe decentralized key-policy attribute-based encryption vol.8, pp.3, 2015,
  9. Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation pp.15320626, 2018,
  10. Light weight and fine-grained access mechanism for secure access to outsourced data* pp.15320626, 2018,
  11. A Novel Authorization Scheme for Multimedia Social Networks Under Cloud Storage Method by Using MA-CP-ABE vol.8, pp.3, 2018,