Skip to main content
Top
Published in: Soft Computing 12/2019

12-07-2018 | Foundations

Attribute-based encryption with adaptive policy

Author: Yiliang Han

Published in: Soft Computing | Issue 12/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

For the fine-grained data access control, attribute-based encryption (ABE) has become one of the potential components to secure cloud storage and social networks, in which the ciphertext is decrypted by the users with specific attributes instead of the unique identity. According to the access policy, ABE can be classified into three classes: ciphertext-policy (CP) ABE, key-policy (KP) ABE, and dual-policy (DP) ABE, which are, respectively, used to control attributes of data, attributes of users, and both of them. But when multiple requirements coexist, none of the three access policies could be applied directly. The paper proposed the new primitive called generalized policy attribute-based encryption (GP-ABE) firstly. A GP-ABE scheme based on bilinear pairing is designed also. In the proposal, the access structure is set by an identification function. Therefore, it could give different access policies according to different requirements adaptively, i.e., it gives the separate or combined access control on data attribute, user attribute, and both of them. Compared with the existing CP-ABE, KP-ABE, and DP-ABE, GP-ABE presents adaptive access policy while avoiding the additional cost. The proposed scheme is proved to be secure under selective attribute set attacks with q-bilinear Diffie–Hellman exponent assumption.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Attrapadung N, Imai H (2009) Dual-policy attribute based encryption. In: Proceedings of the international conference on applied cryptography and network security, pp 168–185 Attrapadung N, Imai H (2009) Dual-policy attribute based encryption. In: Proceedings of the international conference on applied cryptography and network security, pp 168–185
go back to reference Attrapadung N, Yamada S (2015) Duality in ABE: converting attribute based encryption for dual predicate and dual policy via computational encodings. In: Cryptographers’ track at the RSA conference, pp 87–105 Attrapadung N, Yamada S (2015) Duality in ABE: converting attribute based encryption for dual predicate and dual policy via computational encodings. In: Cryptographers’ track at the RSA conference, pp 87–105
go back to reference Bethencourt J, Sahai A, Water B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy, pp 321–334 Bethencourt J, Sahai A, Water B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy, pp 321–334
go back to reference Fahmi A, Abdullah S, Amin F, Siddque N, Ali A (2017) Aggregation operators on triangular cubic fuzzy numbers and its application to multi-criteria decision making problems. J Intell Fuzzy Syst 33:3323–3337CrossRef Fahmi A, Abdullah S, Amin F, Siddque N, Ali A (2017) Aggregation operators on triangular cubic fuzzy numbers and its application to multi-criteria decision making problems. J Intell Fuzzy Syst 33:3323–3337CrossRef
go back to reference Fahmi A, Abdullah S, Amin F, Ali A (2018a) Weighted average rating (War) method for solving group decision making problem using triangular cubic fuzzy hybrid aggregation (Tcfha). Punjab Univ J Math 50(1):23–34MathSciNet Fahmi A, Abdullah S, Amin F, Ali A (2018a) Weighted average rating (War) method for solving group decision making problem using triangular cubic fuzzy hybrid aggregation (Tcfha). Punjab Univ J Math 50(1):23–34MathSciNet
go back to reference Fahmi A, Abdullah S, Amin F, Ahmed R, Ali A (2018b) Triangular cubic linguistic hesitant fuzzy aggregation operators and their application in group decision making. J Intell Fuzzy Syst 1:1–15 Fahmi A, Abdullah S, Amin F, Ahmed R, Ali A (2018b) Triangular cubic linguistic hesitant fuzzy aggregation operators and their application in group decision making. J Intell Fuzzy Syst 1:1–15
go back to reference Goyal V, Pandey O, Sahai A, Water B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the ACM conference on computer and communications security 2006, Alexandria, Virginia, pp 89–98 Goyal V, Pandey O, Sahai A, Water B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the ACM conference on computer and communications security 2006, Alexandria, Virginia, pp 89–98
go back to reference Miyaji A, Tran P (2012) Constant-ciphertext-size dual policy attribute based encryption. In: Proceedings of the international conference on cyberspace safety and security, pp 400–413 Miyaji A, Tran P (2012) Constant-ciphertext-size dual policy attribute based encryption. In: Proceedings of the international conference on cyberspace safety and security, pp 400–413
go back to reference Okamoto T (2010) Fully secure functional encryption with general relations from the decisional linear assumption. In: Proceedings of the conference on CRYPTO 2010, pp 191–208 Okamoto T (2010) Fully secure functional encryption with general relations from the decisional linear assumption. In: Proceedings of the conference on CRYPTO 2010, pp 191–208
go back to reference Pandit T, Barua R (2012) Efficient fully secure attribute-based encryption schemes for general access structures. In: Proceedings of the international conference on provable security, pp 193–214 Pandit T, Barua R (2012) Efficient fully secure attribute-based encryption schemes for general access structures. In: Proceedings of the international conference on provable security, pp 193–214
go back to reference Rao YS, Dutta R (2013) Computationally efficient dual-policy attribute based encryption with short ciphertext. In: Proceedings of the international conference on provable security, pp 288–308 Rao YS, Dutta R (2013) Computationally efficient dual-policy attribute based encryption with short ciphertext. In: Proceedings of the international conference on provable security, pp 288–308
go back to reference Sahai A, Water B (2005) Fuzzy identity based encryption. In: Proceedings of the Eurocrypt 2005, Aarhus, Denmark, pp 457–473 Sahai A, Water B (2005) Fuzzy identity based encryption. In: Proceedings of the Eurocrypt 2005, Aarhus, Denmark, pp 457–473
go back to reference Water B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceedings of the international workshop public key cryptography, pp 53–70 Water B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceedings of the international workshop public key cryptography, pp 53–70
go back to reference Zhong H, Zhu W, Xu Y, Cui J (2018) Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput 22:243–251CrossRefMATH Zhong H, Zhu W, Xu Y, Cui J (2018) Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput 22:243–251CrossRefMATH
Metadata
Title
Attribute-based encryption with adaptive policy
Author
Yiliang Han
Publication date
12-07-2018
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 12/2019
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-018-3370-z

Other articles of this Issue 12/2019

Soft Computing 12/2019 Go to the issue

Premium Partner