Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes

L. Ibraimi, Qiang Tang, Pieter H. Hartel, Willem Jonker

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

128 Citations (Scopus)
19 Downloads (Pure)

Abstract

In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, the data is encrypted under an access policy defined by a user who encrypts the data and a user secret key is associated with a set of attributes which identify the user. A user can decrypt the ciphertext if and only if his attributes satisfy the access policy. In CP-ABE, since the user enforces the access policy at the encryption phase, the policy moves with the encrypted data. This is important for data storage servers where data confidentiality must be preserved even if the server is compromised or un-trusted. In this paper, we provide an efficient CP-ABE scheme which can express any access policy represented by a formula involving $\wedge$ and $\vee$ boolean operators. The scheme is secure under Decision Bilinear Diffie-Hellman assumption (DBDH). Furthermore, we extend the expressivity of the scheme by including \emph{of} (threshold) operator in addition to $\wedge$ and $\vee$ operators. We provide a comparison with existing CP-ABE schemes and show that our schemes are more efficient. Especially, the computational work done by the decryptor is reduced.
Original languageUndefined
Title of host publication5th Information Security Practice and Experience Conference (ISPEC)
Place of PublicationBerlin
PublisherSpringer
Pages1-12
Number of pages12
ISBN (Print)978-3-642-00842-9
DOIs
Publication statusPublished - 13 Apr 2009
Event5th International Conference on Information Security Practice and Experience, ISPEC - Xi'an, China
Duration: 12 Apr 200915 Apr 2009

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume5451
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference5th International Conference on Information Security Practice and Experience, ISPEC
Period12/04/0915/04/09
Other12-15 April 2009

Keywords

  • SCS-Cybersecurity
  • IR-62793
  • METIS-263797
  • EWI-15256

Cite this