Computer Science ›› 2016, Vol. 43 ›› Issue (2): 175-178.doi: 10.11896/j.issn.1002-137X.2016.02.038

Previous Articles     Next Articles

Ciphertext-policy Attribute-based Encryption with Anonymous Access Structure

WANG Hai-ping and ZHAO Jing-jing   

  • Online:2018-12-01 Published:2018-12-01

Abstract: In ciphertext-policy attribute-based encryption(CP-ABE) scheme,a user’s secret key is associated with a set of attributes,and the ciphertext is associated with an access policy.The user can decrypt the ciphertext if and only if the attribute set embedded in his secret key satisfies the access policy specified in the ciphertext.In the present schemes,the access policy is sent to the decryptor along with the ciphertext,which means that the privacy of the encryptor is revealed.In order to solve such problem,we proposed a CP-ABE scheme with anonymous access policy,which is able to preserve the privacy of the encryptor.Our new scheme is proved to be selectively secure against chosen-plaintext attack under DBDH assumption in the standard model.

Key words: Attribute-based encryption,Anonymous access policy,DBDH assumption,Chosen-plaintext secure

[1] Sahai A,Waters B.Fuzzy identity-based encryption[C]∥Advances in Cryptology-EUROCRYPT 2005.Berlin:Springer Berlin Heidelberg,2005:457-473
[2] Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]∥ Procee-ding of the 13th ACM Conference on Computer and Communications Security (ACM CSS 2006).New York:ACM New York,2006:89-98
[3] Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[C]∥ IEEE Symposium on Security and Privacy 2007 (SP 2007).Piscataway:IEEE,2006:321-334
[4] Cheung L,Newport C.Provably secure ciphertext policy ABE[C]∥14th ACM Conference on Computer and Communications Security (ACM CSS 2007).New York:ACM,2007:456-465
[5] Lbraimi L,Tang Q,Hartel P,et al.Efficient and provably secure ciphertext-policy attribute-based encryption schemes[C]∥Information Security Practice and Experience.Berlin:Springer Berlin Heidelberg,2009:1-12
[6] Kapadia A,Tsang P P,Smith S W.Attribute-based publishingwith hidden credentials and hidden policies[C]∥Proceedings USA of 14th Annual Network & Distributed System Security Symposium (NDSS 2007).San Diego,California,USA:NDSS,2007:179-192
[7] Boneh D,Waters B.Conjunctive,subset,and range queries on encrypted data[C]∥4th Theory of Cryptography Conference.Berlin:Springer Berlin Heidelberg,2007:535-554
[8] Nishide T,Yoneyama K,Ohta K.Attribute-based encryptionwith partially hidden encryptor-specified access structures[C]∥6th International Conference on Applied Cryptography and Network Security.Berlin:Springer Berlin Heidelberg,2008:111-129
[9] Müller S,Katzenbeisser S.Hiding the policy in cryptographic access control[M]∥ Security and Trust Management.Berlin:Springer Berlin Heidelberg,2012:90-105
[10] Xu R,Wang Y,Lang B.A Tree-Based CP-ABE Scheme with Hidden Policy Supporting Secure Data Sharing in Cloud Computing[C]∥2013 International Conference on Advanced Cloud and Big Data (CBD).Piscataway:IEEE,2013:51-57
[11] Lai J Z,Deng R H,Li Y J.Fully secure ciphertext-policy hiding CP-ABE[C]∥7th International Conference on Information Security Practice and Experience.Berlin:Springer Berlin Heidelberg,2011:24-39
[12] Waters B.Dual system encryption:realizing fully secure IBE and HIBE under simple assumptions[C]∥Advances in Cryptology-CRYPTO 2009(009).Berlin:Springer Berlin Heidelberg,2011:619-636
[13] Emura K,Miyaji A,Nomura A,et al.A ciphertext-policy attri-bute-based encryption scheme with constant ciphertext length[C]∥5th International Conference on Information Security Practice and Experience.Berlin:Springer Berlin Heidelberg,2009:13-23
[14] Zhou Z B,Huang D J.On efficient ciphertext-policy attribute-based encryption and broadcast encryption extended abstract[C]∥ Proceedings of the 17th ACM Conference on Computer and Communications Security.New York:ACM,2010:753-755
[15] Rao Y S,Dutta R.Recipient anonymous ciphertext-policy attri-bute based encryption[C]∥9th Internatonal Conference on Information Systems Security.Berlin:Springer Berlin Heidelberg, 2013:329-344
[16] Zhang M,Wang X A,Yang X,et al.Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption[C]∥ 2013 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS).Piscataway:IEEE,2013:438-442
[17] Padhya M,Jinwala D.A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy[C]∥ 10th International Conference on Information Systems Security.Berlin:Springer Berlin Heidelberg,2014:167-184

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!