Skip to main content
Top

2018 | OriginalPaper | Chapter

Cryptanalysis on the Anonymity of Li et al.’s Ciphertext-Policy Attribute-Based Encryption Scheme

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Attribute-based encryption is a very powerful primitive in public-key cryptography. It can be adopted in many applications, such as cloud storage, etc. To further protect the privacy of users, anonymity has been considered as an important property in an attribute-based encryption. In an anonymous attribute-based encryption, the access structure of a ciphertext is hidden from users. In this paper, we find an attack method against Li et al.’s anonymous attribute-based encryption schemes. The proposed attack uses an “invalid attribute key” to recover the hidden access structure of a given ciphertext. No information of the master secret key nor private keys are necessary in our attack.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology – Eurocrypt, vol. 3494. LNCS, pp. 457–473. Springer (2005) Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology – Eurocrypt, vol. 3494. LNCS, pp. 457–473. Springer (2005)
2.
go back to reference Attrapadung, N., Libert, B., de Panafieu, E.: Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: International Workshop on Public Key Cryptography, pp. 90–108. Springer (2011) Attrapadung, N., Libert, B., de Panafieu, E.: Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: International Workshop on Public Key Cryptography, pp. 90–108. Springer (2011)
3.
go back to reference Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 89–98 (2006) Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 89–98 (2006)
4.
go back to reference Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 195–203. ACM (2007) Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 195–203. ACM (2007)
5.
go back to reference Bethencournt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP 2007, pp. 321–334 (2007) Bethencournt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP 2007, pp. 321–334 (2007)
6.
go back to reference Cheung, L., Newprot, C.: Provably secure ciphertext policy ABE. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 456–465 ACM (2007) Cheung, L., Newprot, C.: Provably secure ciphertext policy ABE. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 456–465 ACM (2007)
7.
go back to reference Goyal, V., Jain, A., Pandey, O., Sahai, A: Bounded ciphertext policy attribute based encryption. In: Automata, Languages and Programing, pp. 579–591. Springer (2008) Goyal, V., Jain, A., Pandey, O., Sahai, A: Bounded ciphertext policy attribute based encryption. In: Automata, Languages and Programing, pp. 579–591. Springer (2008)
8.
go back to reference Liang, X., Cao, Z., Lin, H., Xing, D.: Provably secure and efficient bounded ciphertext-policy attribute-based encryption. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 343–352. ACM (2009) Liang, X., Cao, Z., Lin, H., Xing, D.: Provably secure and efficient bounded ciphertext-policy attribute-based encryption. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 343–352. ACM (2009)
9.
go back to reference Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Public Key Cryptography. Lecture Notes in Computer Science, pp. 53–70 (2011) Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Public Key Cryptography. Lecture Notes in Computer Science, pp. 53–70 (2011)
10.
go back to reference Li, J., Ren, K., Zhu, B., Wan, Z.: Privacy-aware attribute-based encryption with user accountability. In: International Conference on Information Security, vol. 9, pp. 347–362 Springer (2009) Li, J., Ren, K., Zhu, B., Wan, Z.: Privacy-aware attribute-based encryption with user accountability. In: International Conference on Information Security, vol. 9, pp. 347–362 Springer (2009)
11.
go back to reference Balu, A., Kuppusamy, K.: Ciphertext-policy attribute-based encryption with anonymous access policy. arXiv preprint arXiv:1011.0527 (2010) Balu, A., Kuppusamy, K.: Ciphertext-policy attribute-based encryption with anonymous access policy. arXiv preprint arXiv:​1011.​0527 (2010)
12.
go back to reference Balu, A., Kuppusamy, K.: Privacy preserving ciphertext-policy attribute-based encryption. In: Recent Trends in Network Security and Applications, pp. 402–409. Springer (2010) Balu, A., Kuppusamy, K.: Privacy preserving ciphertext-policy attribute-based encryption. In: Recent Trends in Network Security and Applications, pp. 402–409. Springer (2010)
13.
go back to reference Lai, J., Deng, R.H, Li, Y.: Fully secure cipertext-policy hiding CP-ABE. In: Information Security Practice and Experience, pp. 24–39. Springer (2011) Lai, J., Deng, R.H, Li, Y.: Fully secure cipertext-policy hiding CP-ABE. In: Information Security Practice and Experience, pp. 24–39. Springer (2011)
14.
go back to reference Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: Applied Cryptography and Network Security, pp. 111–129. Springer (2008) Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: Applied Cryptography and Network Security, pp. 111–129. Springer (2008)
15.
go back to reference Padhya, M., Jinwala, D.: A novel approach for searchable CP-ABE with hidden ciphertext-policy. In: Information Systems Security, pp. 167–184. Springer (2014) Padhya, M., Jinwala, D.: A novel approach for searchable CP-ABE with hidden ciphertext-policy. In: Information Systems Security, pp. 167–184. Springer (2014)
16.
go back to reference Phuong, T.V.X., Yang, G., Susilo, W.: Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Trans. Inf. Forensics Secur. 11(1), 35–45 (2016)CrossRef Phuong, T.V.X., Yang, G., Susilo, W.: Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Trans. Inf. Forensics Secur. 11(1), 35–45 (2016)CrossRef
17.
go back to reference Wang, Z., He, M.: CP-ABE with hidden policy from waters efficient construction. Int. J. Distrib. Sens. Netw. 2016, 11 (2016) Wang, Z., He, M.: CP-ABE with hidden policy from waters efficient construction. Int. J. Distrib. Sens. Netw. 2016, 11 (2016)
18.
go back to reference Li, J., et al.: Multi-authority ciphertext-policy attribute-based encryption with accountability. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. ACM (2011) Li, J., et al.: Multi-authority ciphertext-policy attribute-based encryption with accountability. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. ACM (2011)
Metadata
Title
Cryptanalysis on the Anonymity of Li et al.’s Ciphertext-Policy Attribute-Based Encryption Scheme
Authors
Yi-Fan Tseng
Chun-I Fan
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-76451-1_10

Premium Partner