@inproceedings{ed5efcd59cb84ba9810c4bc3124a27bb,
title = "Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes",
abstract = "In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, the data is encrypted under an access policy defined by a user who encrypts the data and a user secret key is associated with a set of attributes which identify the user. A user can decrypt the ciphertext if and only if his attributes satisfy the access policy. In CP-ABE, since the user enforces the access policy at the encryption phase, the policy moves with the encrypted data. This is important for data storage servers where data confidentiality must be preserved even if the server is compromised or un-trusted. In this paper, we provide an efficient CP-ABE scheme which can express any access policy represented by a formula involving $\wedge$ and $\vee$ boolean operators. The scheme is secure under Decision Bilinear Diffie-Hellman assumption (DBDH). Furthermore, we extend the expressivity of the scheme by including \emph{of} (threshold) operator in addition to $\wedge$ and $\vee$ operators. We provide a comparison with existing CP-ABE schemes and show that our schemes are more efficient. Especially, the computational work done by the decryptor is reduced.",
keywords = "SCS-Cybersecurity, IR-62793, METIS-263797, EWI-15256",
author = "L. Ibraimi and Qiang Tang and Hartel, {Pieter H.} and Willem Jonker",
note = "10.1007/978-3-642-00843-6_1 ; 5th International Conference on Information Security Practice and Experience, ISPEC ; Conference date: 12-04-2009 Through 15-04-2009",
year = "2009",
month = apr,
day = "13",
doi = "10.1007/978-3-642-00843-6_1",
language = "Undefined",
isbn = "978-3-642-00842-9",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "1--12",
booktitle = "5th Information Security Practice and Experience Conference (ISPEC)",
address = "Germany",
}