ABSTRACT
Sahai and Waters [6] proposed Attribute-Based Encryption (ABE) as a new paradigm of encryption algorithms that allow the sender to set a policy describing who can decrypt a particular ciphertext. In this paper, we first propose a ciphertext policy attribute-based encryption (CP-ABE) scheme from lattices, which supports flexible threshold access policies on literal (or boolean) attributes. Then we extend it to support multi-valued attributes without increasing the public key and ciphertext size. Our scheme's master secret key has only one matrix despite of the number of the system's attributes. The security of our schemes is based on the worst-case hardness on lattices.
- Shweta Agrawal, Dan Boneh, and Xavier Boyen. Efficient lattice (H)IBE in the standard model. In Henri Gilbert, editor, Advances in Cryptology - EUROCRYPT 2010, volume 6110 of Lecture Notes in Computer Science, pages 553--572. Springer Berlin/Heidelberg, 2010. Google ScholarDigital Library
- Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, and Hoeteck Wee. Fuzzy identity based encryption from lattices. Cryptology ePrint Archive, Report 2011/414, 2011. http://eprint.iacr.org/.Google Scholar
- Shweta Agrawal, David Mandell Freeman, and Vinod Vaikuntanathan. Functional encryption for inner product predicates from learning with errors. In ASIACRYPT, pages 21--40, 2011. Google ScholarDigital Library
- Craig Gentry, Chris Peikert, and Vinod Vaikuntanathan. Trap-doors for hard lattices and new cryptographic constructions. In Proceedings of the 40th annual ACM symposium on Theory of computing, STOC '08, pages 197--206, New York, NY, USA, 2008. ACM. Google ScholarDigital Library
- Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security, CCS '06, pages 89--98, New York, NY, USA, 2006. ACM. Google ScholarDigital Library
- Amit Sahai and Brent Waters. Fuzzy identity-based encryption. In Ronald Cramer, editor, Advances in Cryptology - EUROCRYPT 2005, volume 3494 of Lecture Notes in Computer Science, pages 557--557. Springer Berlin/Heidelberg, 2005. Google ScholarDigital Library
- Jiang Zhang and Zhenfeng Zhang. A ciphertext policy attribute-based encryption scheme without pairings. In INSCRYPT, 2011. (To appear). Google ScholarDigital Library
Index Terms
- Ciphertext policy attribute-based encryption from lattices
Recommendations
Fully Secure Ciphertext-Policy Attribute-Based Encryption with Constant Size Ciphertext
MINES '11: Proceedings of the 2011 Third International Conference on Multimedia Information Networking and SecurityIn a cipher text-policy ABE (CP-ABE) scheme, an encrypt or can express any access policy, stating what kind of receivers will be able to decrypt the message in the encryption algorithm. In most CP-ABE schemes, the size of cipher texts is not constant, ...
Comments on Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation
Attribute-based encryption (ABE) with outsourced decryption not only allows fine-grained and versatile sharing of encrypted data, but also largely mitigates the decryption overhead and the ciphertext size in the standard ABE schemes. Very recently, Xu ...
Recipient Anonymous Ciphertext-Policy Attribute Based Encryption
ICISS 2013: Proceedings of the 9th International Conference on Information Systems Security - Volume 8303Attribute Based Encryption ABE is a promising and increasingly versatile paradigm. Given the many potential uses of ABE schemes, constructing efficient schemes that provide recipient anonymity via policy hiding while ensuring constant-size secret key ...
Comments