Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes

Attribute-based encryption (ABE) is an augmentation of public key encryption that allows users to encrypt and decrypt messages based on users' attributes. In a (t, s) threshold ABE, users who can decrypt a ciphertext must hold at least t attributes among the s attributes specified by the encryp...

Full description

Saved in:
Bibliographic Details
Main Authors: SUSILO, Willy, YANG, Guomin, GUO, Fuchun, HUANG, Qiong
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2018
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7290
https://ink.library.smu.edu.sg/context/sis_research/article/8293/viewcontent/1_s2.0_S002002551731099X_main.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-8293
record_format dspace
spelling sg-smu-ink.sis_research-82932022-09-29T07:43:16Z Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes SUSILO, Willy YANG, Guomin GUO, Fuchun HUANG, Qiong Attribute-based encryption (ABE) is an augmentation of public key encryption that allows users to encrypt and decrypt messages based on users' attributes. In a (t, s) threshold ABE, users who can decrypt a ciphertext must hold at least t attributes among the s attributes specified by the encryptor. At PKC 2010, Herranz, Laguillaumie and Raft& proposed the first threshold ABE with constant-size ciphertexts. In order to ensure the encryptor can flexibly select the attribute set and a threshold value, they use dummy attributes to satisfy the decryption requirement. The advantage of their scheme is that any addition or removal of the attributes will not require any change to users' private keys or public parameters. Unfortunately, the need for dummy attributes makes their scheme inefficient, since the computational cost of encryption is linear to the size of selected attribute set and dummy attribute set. In this work, we improve Herranz et al.'s work, and propose a new threshold ABE scheme which does not use any dummy attribute. Our scheme not only retains the nice feature of Herranz et al.'s scheme, but also offers two improvements in comparison to the previous work. Firstly, the computational costs of encryption and decryption are only linear in the size of the selected attribute set. Secondly, without any dummy attribute, most of the computations can be conducted without the knowledge of the threshold t. Hence, threshold change in the encryption phase does not require complete recomputation of the ciphertext. (C) 2017 Elsevier Inc. All rights reserved. 2018-03-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7290 info:doi/10.1016/j.ins.2017.11.037 https://ink.library.smu.edu.sg/context/sis_research/article/8293/viewcontent/1_s2.0_S002002551731099X_main.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Threshold attribute-based encryption Constant size Dummy attributes Provable security Data Storage Systems Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Threshold attribute-based encryption
Constant size
Dummy attributes
Provable security
Data Storage Systems
Information Security
spellingShingle Threshold attribute-based encryption
Constant size
Dummy attributes
Provable security
Data Storage Systems
Information Security
SUSILO, Willy
YANG, Guomin
GUO, Fuchun
HUANG, Qiong
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
description Attribute-based encryption (ABE) is an augmentation of public key encryption that allows users to encrypt and decrypt messages based on users' attributes. In a (t, s) threshold ABE, users who can decrypt a ciphertext must hold at least t attributes among the s attributes specified by the encryptor. At PKC 2010, Herranz, Laguillaumie and Raft& proposed the first threshold ABE with constant-size ciphertexts. In order to ensure the encryptor can flexibly select the attribute set and a threshold value, they use dummy attributes to satisfy the decryption requirement. The advantage of their scheme is that any addition or removal of the attributes will not require any change to users' private keys or public parameters. Unfortunately, the need for dummy attributes makes their scheme inefficient, since the computational cost of encryption is linear to the size of selected attribute set and dummy attribute set. In this work, we improve Herranz et al.'s work, and propose a new threshold ABE scheme which does not use any dummy attribute. Our scheme not only retains the nice feature of Herranz et al.'s scheme, but also offers two improvements in comparison to the previous work. Firstly, the computational costs of encryption and decryption are only linear in the size of the selected attribute set. Secondly, without any dummy attribute, most of the computations can be conducted without the knowledge of the threshold t. Hence, threshold change in the encryption phase does not require complete recomputation of the ciphertext. (C) 2017 Elsevier Inc. All rights reserved.
format text
author SUSILO, Willy
YANG, Guomin
GUO, Fuchun
HUANG, Qiong
author_facet SUSILO, Willy
YANG, Guomin
GUO, Fuchun
HUANG, Qiong
author_sort SUSILO, Willy
title Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
title_short Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
title_full Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
title_fullStr Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
title_full_unstemmed Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
title_sort constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
publisher Institutional Knowledge at Singapore Management University
publishDate 2018
url https://ink.library.smu.edu.sg/sis_research/7290
https://ink.library.smu.edu.sg/context/sis_research/article/8293/viewcontent/1_s2.0_S002002551731099X_main.pdf
_version_ 1770576305004216320