Skip to main content
Erschienen in: Soft Computing 20/2017

16.06.2016 | Methodologies and Application

Adaptable key-policy attribute-based encryption with time interval

verfasst von: Siqi Ma, Junzuo Lai, Robert H. Deng, Xuhua Ding

Erschienen in: Soft Computing | Ausgabe 20/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we introduce a new cryptographic primitive: adaptable KP-ABE with time interval (KP-TIABE), which is an extension of key-policy attribute-based encryption (KP-ABE). Adaptable KP-TIABE specifies a decryption time interval for every ciphertext such that the ciphertext can only be decrypted within this time interval. To be more flexible, the decryption time interval associated with a ciphertext can be adjusted on demand by a semi-trusted server. We propose a formal model for adaptable KP-TIABE, present a concrete adaptable KP-TIABE scheme and prove its security under the security model.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Beimel A (1996) Secure schemes for secret sharing and key distribution. PhD thesis, PhD thesis, Israel Institute of Technology, Technion, Haifa, Israel Beimel A (1996) Secure schemes for secret sharing and key distribution. PhD thesis, PhD thesis, Israel Institute of Technology, Technion, Haifa, Israel
Zurück zum Zitat Blake IF, Chan ACF (2004) Scalable, server-passive, user-anonymous timed release public key encryption from bilinear pairing. In: IACR cryptology ePrint archive, 2004, p 211 Blake IF, Chan ACF (2004) Scalable, server-passive, user-anonymous timed release public key encryption from bilinear pairing. In: IACR cryptology ePrint archive, 2004, p 211
Zurück zum Zitat Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Advances in cryptology—EUROCRYPT’98. Springer, pp 127–144 Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Advances in cryptology—EUROCRYPT’98. Springer, pp 127–144
Zurück zum Zitat Boneh D, Boyen X, Goh E-J (2005) Hierarchical identity based encryption with constant size ciphertext. In: Advances in cryptology—EUROCRYPT 2005. Springer, pp 440–456 Boneh D, Boyen X, Goh E-J (2005) Hierarchical identity based encryption with constant size ciphertext. In: Advances in cryptology—EUROCRYPT 2005. Springer, pp 440–456
Zurück zum Zitat Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 89–98 Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 89–98
Zurück zum Zitat Jakobsson M (1999) On quorum controlled asymmetric proxy re-encryption. In: Public key cryptography, vol 1560. Springer, pp 112–121 Jakobsson M (1999) On quorum controlled asymmetric proxy re-encryption. In: Public key cryptography, vol 1560. Springer, pp 112–121
Zurück zum Zitat Kasamatsu K, Matsuda T, Emura K, Attrapadung N, Hanaoka G, Imai H (2012) Time-specific encryption from forward-secure encryption. In: Security and cryptography for networks, vol 7485. Springer, Heidelberg, pp 184–204 Kasamatsu K, Matsuda T, Emura K, Attrapadung N, Hanaoka G, Imai H (2012) Time-specific encryption from forward-secure encryption. In: Security and cryptography for networks, vol 7485. Springer, Heidelberg, pp 184–204
Zurück zum Zitat Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354CrossRef Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354CrossRef
Zurück zum Zitat Lai J, Deng RH, Yang Y, Weng J (2014) Adaptable ciphertext-policy attribute-based encryption. In: Pairing-based cryptography—pairing 2013. Springer, pp 199–214 Lai J, Deng RH, Yang Y, Weng J (2014) Adaptable ciphertext-policy attribute-based encryption. In: Pairing-based cryptography—pairing 2013. Springer, pp 199–214
Zurück zum Zitat Mora Afonso V, Carballero-Gil P (2014) Using identity-based cryptography in mobile applications. In: International joint conference SOCO’13-CISIS’13-ICEUTE’13, 239. Springer, pp 527–536 Mora Afonso V, Carballero-Gil P (2014) Using identity-based cryptography in mobile applications. In: International joint conference SOCO’13-CISIS’13-ICEUTE’13, 239. Springer, pp 527–536
Zurück zum Zitat Muñoz AM, Rodríguez AF, Encinas LH, Alcázar BA (2013) A toolbox for dpa attacks to smart cards. In: International joint conference SOCO. Springer, pp 399–408 Muñoz AM, Rodríguez AF, Encinas LH, Alcázar BA (2013) A toolbox for dpa attacks to smart cards. In: International joint conference SOCO. Springer, pp 399–408
Zurück zum Zitat Paterson KG, Quaglia EA (2010) Time-specific encryption. In: Garay JA, De Prisco R (eds) Security and cryptography for networks. Springer, Berlin, pp 1–16 Paterson KG, Quaglia EA (2010) Time-specific encryption. In: Garay JA, De Prisco R (eds) Security and cryptography for networks. Springer, Berlin, pp 1–16
Zurück zum Zitat Rivest RL, Shamir A, Wagner DA (1996) Time-lock puzzles and timed-release crypto. Technical report, MIT, MA Rivest RL, Shamir A, Wagner DA (1996) Time-lock puzzles and timed-release crypto. Technical report, MIT, MA
Zurück zum Zitat Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Advances in cryptology—EUROCRYPT 2005. Springer, pp 457–473 Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Advances in cryptology—EUROCRYPT 2005. Springer, pp 457–473
Zurück zum Zitat Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Public key cryptography—international conference on practice and theory of public-key cryptography 2011. Springer, pp 53–70 Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Public key cryptography—international conference on practice and theory of public-key cryptography 2011. Springer, pp 53–70
Zurück zum Zitat Weng J, Deng RH, Ding X, Chu CK, Lai J (2009) Conditional proxy re-encryption secure against chosen-ciphertext attack. In: Proceedings of the 4th international symposium on information, computer, and communications security. ACM, pp 322–332 Weng J, Deng RH, Ding X, Chu CK, Lai J (2009) Conditional proxy re-encryption secure against chosen-ciphertext attack. In: Proceedings of the 4th international symposium on information, computer, and communications security. ACM, pp 322–332
Metadaten
Titel
Adaptable key-policy attribute-based encryption with time interval
verfasst von
Siqi Ma
Junzuo Lai
Robert H. Deng
Xuhua Ding
Publikationsdatum
16.06.2016
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 20/2017
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-016-2177-z

Weitere Artikel der Ausgabe 20/2017

Soft Computing 20/2017 Zur Ausgabe

Premium Partner