Skip to main content
Top
Published in: Mobile Networks and Applications 5/2011

01-10-2011

Enhancing Attribute-Based Encryption with Attribute Hierarchy

Authors: Jin Li, Qian Wang, Cong Wang, Kui Ren

Published in: Mobile Networks and Applications | Issue 5/2011

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Attribute-based encryption (ABE) has been envisioned as a promising cryptographic primitive for realizing secure and flexible access control. However, ABE is being criticized for its high scheme overhead as extensive pairing operations are usually required. In this paper, we focus on improving the efficiency of ABE by leveraging a previously overlooked fact, i.e., the often-found hierarchical relationships among the attributes that are inherent to many access control scenarios. As the first research effort along this direction, we coin the notion of hierarchical ABE (HABE), which can be viewed as the generalization of traditional ABE in the sense that both definitions are equal when all attributes are independent. We further give a concrete HABE construction considering a tree hierarchy among the attributes, which is provably secure. More importantly, our construction exhibits significant improvements over the traditional ABE when attribute hierarchies exist.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Appendix
Available only for authorised users
Footnotes
1
In this paper, assume ω is in depth k i of the i-th tree and let its path be (ω i0, ω i1, ⋯ , ω i,k − 1, ω). For convenience, we will use the notation ω ik instead of ω to denote its position in its path, without especial explanation in the following sections.
 
Literature
1.
go back to reference Boneh D, Boyen X, Goh E (2005) Hierarchical identity based encryption with constant ciphertext. In: EUROCRYPT’05. LNCS 3494. Springer, New York, pp 440–456 Boneh D, Boyen X, Goh E (2005) Hierarchical identity based encryption with constant ciphertext. In: EUROCRYPT’05. LNCS 3494. Springer, New York, pp 440–456
2.
go back to reference Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy’07. IEEE, Washington, DC, pp 321–334 Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy’07. IEEE, Washington, DC, pp 321–334
3.
go back to reference Boneh D, Boyen, X (2004) Efficient selective-ID secure identity based encryption without random oracles. In: EUROCRYPT’04. LNCS 3027. Springer, New York, pp 223–2382004 Boneh D, Boyen, X (2004) Efficient selective-ID secure identity based encryption without random oracles. In: EUROCRYPT’04. LNCS 3027. Springer, New York, pp 223–2382004
4.
go back to reference Boneh D, Canetti R, Halevi S, Katz J (2007) Chosen-ciphertext security from identity-based encryption. SIAM J Comput 36(5):1301–1328MathSciNetCrossRef Boneh D, Canetti R, Halevi S, Katz J (2007) Chosen-ciphertext security from identity-based encryption. SIAM J Comput 36(5):1301–1328MathSciNetCrossRef
5.
go back to reference Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: TCC’07. LNCS 4392. Springer, pp 535–554 Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: TCC’07. LNCS 4392. Springer, pp 535–554
6.
go back to reference Chase M (2007) Multi-authority attribute based encryption. In: TCC’07. LNCS 4392. Springer, New York, pp 515–534 Chase M (2007) Multi-authority attribute based encryption. In: TCC’07. LNCS 4392. Springer, New York, pp 515–534
7.
go back to reference Cheung L, Newport C (2007) Provably secure ciphertext policy ABE. In: CCS’07, Proceedings of the 14th ACM conference on Computer and communications security. ACM, New York, pp 456–465CrossRef Cheung L, Newport C (2007) Provably secure ciphertext policy ABE. In: CCS’07, Proceedings of the 14th ACM conference on Computer and communications security. ACM, New York, pp 456–465CrossRef
8.
go back to reference Fujisaki E, Okamoto T (1999) Secure integration of asymmetric and symmetric encryption schemes. In: CRYPTO’99. LNCS 1666. Springer, New York, pp 537–554 Fujisaki E, Okamoto T (1999) Secure integration of asymmetric and symmetric encryption schemes. In: CRYPTO’99. LNCS 1666. Springer, New York, pp 537–554
9.
go back to reference Galindo D, Herranz J, Kiltz E (2006) On the generic construction of identity-based signatures with additional properties. In: ASIACRYPT’06. LNCS 4284. Springer, New York, pp 178–193 Galindo D, Herranz J, Kiltz E (2006) On the generic construction of identity-based signatures with additional properties. In: ASIACRYPT’06. LNCS 4284. Springer, New York, pp 178–193
10.
go back to reference Goyal V, Jain A, Pandey O, Sahai A (2008) Bounded ciphertext policy attribute based encryption. In: ICALP’08. LNCS 5126, pp 579–591 Goyal V, Jain A, Pandey O, Sahai A (2008) Bounded ciphertext policy attribute based encryption. In: ICALP’08. LNCS 5126, pp 579–591
11.
go back to reference Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: CCS’06. ACM, New York, pp 89–98 Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: CCS’06. ACM, New York, pp 89–98
12.
go back to reference Kapadia A, Tsang PP, Smith SW (2007) Attribute-based publishing with hidden credentials and hidden policies. In: Proc of network and distributed system security symposium (NDSS), pp 179–192 Kapadia A, Tsang PP, Smith SW (2007) Attribute-based publishing with hidden credentials and hidden policies. In: Proc of network and distributed system security symposium (NDSS), pp 179–192
13.
go back to reference Katz J, Sahai A, Waters B (2008) Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: EUROCRYPT’08. LNCS 4965. Springer, New York, pp 146–162 Katz J, Sahai A, Waters B (2008) Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: EUROCRYPT’08. LNCS 4965. Springer, New York, pp 146–162
14.
go back to reference Li J, Ren K, Zhu B, Wan Z (2009) Privacy-aware attribute-based encryption with user accountability. In: proceeding of ISC’09, pp 347–362 Li J, Ren K, Zhu B, Wan Z (2009) Privacy-aware attribute-based encryption with user accountability. In: proceeding of ISC’09, pp 347–362
18.
go back to reference Nishide T, Yoneyama K, Ohta K (2008) ABE with partially hidden encryptor-specified access structure. In: ACNS’08. LNCS 5037. Springer, New York, pp 111–129 Nishide T, Yoneyama K, Ohta K (2008) ABE with partially hidden encryptor-specified access structure. In: ACNS’08. LNCS 5037. Springer, New York, pp 111–129
19.
go back to reference Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: CCS’07. ACM, New York, pp 195–203 Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: CCS’07. ACM, New York, pp 195–203
20.
go back to reference Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: EUROCRYPT’05. LNCS 3494. Springer, New York, pp 457–473 Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: EUROCRYPT’05. LNCS 3494. Springer, New York, pp 457–473
21.
go back to reference Sahai A (1999) Non-malleable non-interactive zero knowledge and adaptive chosen ciphertext security. In: IEEE symp on foundations of computer science Sahai A (1999) Non-malleable non-interactive zero knowledge and adaptive chosen ciphertext security. In: IEEE symp on foundations of computer science
22.
go back to reference Yu S, Ren K, Lou W, Li J (2009) Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Securecomm’09 Yu S, Ren K, Lou W, Li J (2009) Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Securecomm’09
23.
go back to reference Waters B (2005) Efficient identity-based encryption without random oracles. In: EUROCRYPT’05. LNCS 3494. Springer, New York, pp 114–127 Waters B (2005) Efficient identity-based encryption without random oracles. In: EUROCRYPT’05. LNCS 3494. Springer, New York, pp 114–127
Metadata
Title
Enhancing Attribute-Based Encryption with Attribute Hierarchy
Authors
Jin Li
Qian Wang
Cong Wang
Kui Ren
Publication date
01-10-2011
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 5/2011
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-010-0233-y

Other articles of this Issue 5/2011

Mobile Networks and Applications 5/2011 Go to the issue