Skip to main content
Erschienen in: Mobile Networks and Applications 5/2011

01.10.2011

Enhancing Attribute-Based Encryption with Attribute Hierarchy

verfasst von: Jin Li, Qian Wang, Cong Wang, Kui Ren

Erschienen in: Mobile Networks and Applications | Ausgabe 5/2011

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Attribute-based encryption (ABE) has been envisioned as a promising cryptographic primitive for realizing secure and flexible access control. However, ABE is being criticized for its high scheme overhead as extensive pairing operations are usually required. In this paper, we focus on improving the efficiency of ABE by leveraging a previously overlooked fact, i.e., the often-found hierarchical relationships among the attributes that are inherent to many access control scenarios. As the first research effort along this direction, we coin the notion of hierarchical ABE (HABE), which can be viewed as the generalization of traditional ABE in the sense that both definitions are equal when all attributes are independent. We further give a concrete HABE construction considering a tree hierarchy among the attributes, which is provably secure. More importantly, our construction exhibits significant improvements over the traditional ABE when attribute hierarchies exist.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
In this paper, assume ω is in depth k i of the i-th tree and let its path be (ω i0, ω i1, ⋯ , ω i,k − 1, ω). For convenience, we will use the notation ω ik instead of ω to denote its position in its path, without especial explanation in the following sections.
 
Literatur
1.
Zurück zum Zitat Boneh D, Boyen X, Goh E (2005) Hierarchical identity based encryption with constant ciphertext. In: EUROCRYPT’05. LNCS 3494. Springer, New York, pp 440–456 Boneh D, Boyen X, Goh E (2005) Hierarchical identity based encryption with constant ciphertext. In: EUROCRYPT’05. LNCS 3494. Springer, New York, pp 440–456
2.
Zurück zum Zitat Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy’07. IEEE, Washington, DC, pp 321–334 Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy’07. IEEE, Washington, DC, pp 321–334
3.
Zurück zum Zitat Boneh D, Boyen, X (2004) Efficient selective-ID secure identity based encryption without random oracles. In: EUROCRYPT’04. LNCS 3027. Springer, New York, pp 223–2382004 Boneh D, Boyen, X (2004) Efficient selective-ID secure identity based encryption without random oracles. In: EUROCRYPT’04. LNCS 3027. Springer, New York, pp 223–2382004
4.
Zurück zum Zitat Boneh D, Canetti R, Halevi S, Katz J (2007) Chosen-ciphertext security from identity-based encryption. SIAM J Comput 36(5):1301–1328MathSciNetCrossRef Boneh D, Canetti R, Halevi S, Katz J (2007) Chosen-ciphertext security from identity-based encryption. SIAM J Comput 36(5):1301–1328MathSciNetCrossRef
5.
Zurück zum Zitat Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: TCC’07. LNCS 4392. Springer, pp 535–554 Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: TCC’07. LNCS 4392. Springer, pp 535–554
6.
Zurück zum Zitat Chase M (2007) Multi-authority attribute based encryption. In: TCC’07. LNCS 4392. Springer, New York, pp 515–534 Chase M (2007) Multi-authority attribute based encryption. In: TCC’07. LNCS 4392. Springer, New York, pp 515–534
7.
Zurück zum Zitat Cheung L, Newport C (2007) Provably secure ciphertext policy ABE. In: CCS’07, Proceedings of the 14th ACM conference on Computer and communications security. ACM, New York, pp 456–465CrossRef Cheung L, Newport C (2007) Provably secure ciphertext policy ABE. In: CCS’07, Proceedings of the 14th ACM conference on Computer and communications security. ACM, New York, pp 456–465CrossRef
8.
Zurück zum Zitat Fujisaki E, Okamoto T (1999) Secure integration of asymmetric and symmetric encryption schemes. In: CRYPTO’99. LNCS 1666. Springer, New York, pp 537–554 Fujisaki E, Okamoto T (1999) Secure integration of asymmetric and symmetric encryption schemes. In: CRYPTO’99. LNCS 1666. Springer, New York, pp 537–554
9.
Zurück zum Zitat Galindo D, Herranz J, Kiltz E (2006) On the generic construction of identity-based signatures with additional properties. In: ASIACRYPT’06. LNCS 4284. Springer, New York, pp 178–193 Galindo D, Herranz J, Kiltz E (2006) On the generic construction of identity-based signatures with additional properties. In: ASIACRYPT’06. LNCS 4284. Springer, New York, pp 178–193
10.
Zurück zum Zitat Goyal V, Jain A, Pandey O, Sahai A (2008) Bounded ciphertext policy attribute based encryption. In: ICALP’08. LNCS 5126, pp 579–591 Goyal V, Jain A, Pandey O, Sahai A (2008) Bounded ciphertext policy attribute based encryption. In: ICALP’08. LNCS 5126, pp 579–591
11.
Zurück zum Zitat Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: CCS’06. ACM, New York, pp 89–98 Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: CCS’06. ACM, New York, pp 89–98
12.
Zurück zum Zitat Kapadia A, Tsang PP, Smith SW (2007) Attribute-based publishing with hidden credentials and hidden policies. In: Proc of network and distributed system security symposium (NDSS), pp 179–192 Kapadia A, Tsang PP, Smith SW (2007) Attribute-based publishing with hidden credentials and hidden policies. In: Proc of network and distributed system security symposium (NDSS), pp 179–192
13.
Zurück zum Zitat Katz J, Sahai A, Waters B (2008) Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: EUROCRYPT’08. LNCS 4965. Springer, New York, pp 146–162 Katz J, Sahai A, Waters B (2008) Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: EUROCRYPT’08. LNCS 4965. Springer, New York, pp 146–162
14.
Zurück zum Zitat Li J, Ren K, Zhu B, Wan Z (2009) Privacy-aware attribute-based encryption with user accountability. In: proceeding of ISC’09, pp 347–362 Li J, Ren K, Zhu B, Wan Z (2009) Privacy-aware attribute-based encryption with user accountability. In: proceeding of ISC’09, pp 347–362
18.
Zurück zum Zitat Nishide T, Yoneyama K, Ohta K (2008) ABE with partially hidden encryptor-specified access structure. In: ACNS’08. LNCS 5037. Springer, New York, pp 111–129 Nishide T, Yoneyama K, Ohta K (2008) ABE with partially hidden encryptor-specified access structure. In: ACNS’08. LNCS 5037. Springer, New York, pp 111–129
19.
Zurück zum Zitat Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: CCS’07. ACM, New York, pp 195–203 Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: CCS’07. ACM, New York, pp 195–203
20.
Zurück zum Zitat Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: EUROCRYPT’05. LNCS 3494. Springer, New York, pp 457–473 Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: EUROCRYPT’05. LNCS 3494. Springer, New York, pp 457–473
21.
Zurück zum Zitat Sahai A (1999) Non-malleable non-interactive zero knowledge and adaptive chosen ciphertext security. In: IEEE symp on foundations of computer science Sahai A (1999) Non-malleable non-interactive zero knowledge and adaptive chosen ciphertext security. In: IEEE symp on foundations of computer science
22.
Zurück zum Zitat Yu S, Ren K, Lou W, Li J (2009) Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Securecomm’09 Yu S, Ren K, Lou W, Li J (2009) Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Securecomm’09
23.
Zurück zum Zitat Waters B (2005) Efficient identity-based encryption without random oracles. In: EUROCRYPT’05. LNCS 3494. Springer, New York, pp 114–127 Waters B (2005) Efficient identity-based encryption without random oracles. In: EUROCRYPT’05. LNCS 3494. Springer, New York, pp 114–127
Metadaten
Titel
Enhancing Attribute-Based Encryption with Attribute Hierarchy
verfasst von
Jin Li
Qian Wang
Cong Wang
Kui Ren
Publikationsdatum
01.10.2011
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 5/2011
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-010-0233-y

Weitere Artikel der Ausgabe 5/2011

Mobile Networks and Applications 5/2011 Zur Ausgabe

Neuer Inhalt