Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption
Attribute-based encryption (ABE), introduced by Sahai and Waters, is a promising cryptographic primitive, which has been widely applied to implement fine-grained access control system for encrypted data. In its key-policy flavor, attribute sets are used to annotate ciphertexts and secret keys are as...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2014
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/2603 https://ink.library.smu.edu.sg/context/sis_research/article/3603/viewcontent/FullySecureKey_policy_2014_av.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-3603 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-36032021-03-24T08:41:57Z Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption LAI, Junzuo DENG, Robert H. LI, Yingjiu WENG, Jian Attribute-based encryption (ABE), introduced by Sahai and Waters, is a promising cryptographic primitive, which has been widely applied to implement fine-grained access control system for encrypted data. In its key-policy flavor, attribute sets are used to annotate ciphertexts and secret keys are associated with access structures that specify which ciphertexts a user is entitled to decrypt. In most existing key-policy attribute-based encryption (KP-ABE) constructions, the size of the ciphertext is proportional to the number of attributes associated with it and the decryption cost is proportional to the number of attributes used during decryption. In this paper, we present a new construction of KP-ABE. Our proposed construction is the first KP-ABE scheme, which has the following features simultaneously: expressive (i.e., supporting arbitrary monotonic access structures); fully secure in the standard model; constant-size ciphertexts and fast decryption. The downside of our construction is that secret keys have quadratic size in the number of attributes. 2014-06-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/2603 info:doi/10.1145/2590296.2590334 https://ink.library.smu.edu.sg/context/sis_research/article/3603/viewcontent/FullySecureKey_policy_2014_av.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Key-Policy Attribute-Based Encryption Full Security Constant-Size Ciphertexts Fast Decryption Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Key-Policy Attribute-Based Encryption Full Security Constant-Size Ciphertexts Fast Decryption Information Security |
spellingShingle |
Key-Policy Attribute-Based Encryption Full Security Constant-Size Ciphertexts Fast Decryption Information Security LAI, Junzuo DENG, Robert H. LI, Yingjiu WENG, Jian Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption |
description |
Attribute-based encryption (ABE), introduced by Sahai and Waters, is a promising cryptographic primitive, which has been widely applied to implement fine-grained access control system for encrypted data. In its key-policy flavor, attribute sets are used to annotate ciphertexts and secret keys are associated with access structures that specify which ciphertexts a user is entitled to decrypt. In most existing key-policy attribute-based encryption (KP-ABE) constructions, the size of the ciphertext is proportional to the number of attributes associated with it and the decryption cost is proportional to the number of attributes used during decryption. In this paper, we present a new construction of KP-ABE. Our proposed construction is the first KP-ABE scheme, which has the following features simultaneously: expressive (i.e., supporting arbitrary monotonic access structures); fully secure in the standard model; constant-size ciphertexts and fast decryption. The downside of our construction is that secret keys have quadratic size in the number of attributes. |
format |
text |
author |
LAI, Junzuo DENG, Robert H. LI, Yingjiu WENG, Jian |
author_facet |
LAI, Junzuo DENG, Robert H. LI, Yingjiu WENG, Jian |
author_sort |
LAI, Junzuo |
title |
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption |
title_short |
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption |
title_full |
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption |
title_fullStr |
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption |
title_full_unstemmed |
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption |
title_sort |
fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2014 |
url |
https://ink.library.smu.edu.sg/sis_research/2603 https://ink.library.smu.edu.sg/context/sis_research/article/3603/viewcontent/FullySecureKey_policy_2014_av.pdf |
_version_ |
1770572521949626368 |