A Fully Secure KP-ABE Scheme on Prime-Order Bilinear Groups through Selective Techniques

Author:

Obiri Isaac Amankona123ORCID,Xia Qi123,Xia Hu1ORCID,Obour Agyekum Kwame Opuni-Boachie123,Asamoah Kwame Omono123ORCID,Sifah Emmanuel Boateng123ORCID,Zhang Xiaosong1,Gao Jianbin234ORCID

Affiliation:

1. School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China

2. UESTC- CDFH Joint Institute of Blockchain, Chengdu, China

3. Chengdu Jiaozi Financial Holding Group Co. LTD., Chengdu, China

4. School of Resources and Environment, University of Electronic Science and Technology of China, Chengdu, China

Abstract

Key-policy attribute-based encryption (KP-ABE) is the cryptographic primitive which enables fine grained access control while still providing end-to-end encryption. Although traditional encryption schemes can provide end-to-end encryption, users have to either share the same decryption keys or the data have to be stored in multiple instances which are encrypted with different keys. Both of these options are undesirable. However, KP-ABE can provide less key overhead compared to the traditional encryption schemes. While there are a lot of KP-ABE schemes, none of them simultaneously supports multiuse of attributes, adaptive security, monotone span programs, and static security assumption. Hence, we propose a fully secure KP-ABE scheme for monotone span programs in prime-order group. This scheme uses selective security proof techniques to obtain the requisite ingredients for full security proof. This strengthens the correlation between selective and full security models and enables the transition of the best qualities in selective security models to fully secure systems. The security proof is based on decisional linear assumption and three-party Diffie–Hellman assumption.

Funder

Sichuan Science and Technology Program

Publisher

Hindawi Limited

Subject

Computer Networks and Communications,Information Systems

Reference39 articles.

1. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions

2. New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts

3. Attribute based encryption for fine-grained access control of encrypted data;V. Goyal

4. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization;B. Waters

Cited by 6 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Fully Secure ABE Schemes Based on Composite and Prime Order Groups;Attribute‐based Encryption (ABE);2023-10-06

2. Foundation of Attribute‐Based Encryption;Attribute‐based Encryption (ABE);2023-10-06

3. A certificateless signcryption with proxy-encryption for securing agricultural data in the cloud;Journal of Computer Security;2023-08-28

4. Blockchain-based Health Data Sharing for Continuous Disease Surveillance in Smart Environments;2022 IEEE 28th International Conference on Parallel and Distributed Systems (ICPADS);2023-01

5. Anonymous Signcryption for Securing Knowledge Management System;2022 19th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP);2022-12-16

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3