Skip to main content
Log in

Adaptable key-policy attribute-based encryption with time interval

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

In this paper, we introduce a new cryptographic primitive: adaptable KP-ABE with time interval (KP-TIABE), which is an extension of key-policy attribute-based encryption (KP-ABE). Adaptable KP-TIABE specifies a decryption time interval for every ciphertext such that the ciphertext can only be decrypted within this time interval. To be more flexible, the decryption time interval associated with a ciphertext can be adjusted on demand by a semi-trusted server. We propose a formal model for adaptable KP-TIABE, present a concrete adaptable KP-TIABE scheme and prove its security under the security model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • Beimel A (1996) Secure schemes for secret sharing and key distribution. PhD thesis, PhD thesis, Israel Institute of Technology, Technion, Haifa, Israel

  • Blake IF, Chan ACF (2004) Scalable, server-passive, user-anonymous timed release public key encryption from bilinear pairing. In: IACR cryptology ePrint archive, 2004, p 211

  • Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Advances in cryptology—EUROCRYPT’98. Springer, pp 127–144

  • Boneh D, Boyen X, Goh E-J (2005) Hierarchical identity based encryption with constant size ciphertext. In: Advances in cryptology—EUROCRYPT 2005. Springer, pp 440–456

  • Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 89–98

  • Jakobsson M (1999) On quorum controlled asymmetric proxy re-encryption. In: Public key cryptography, vol 1560. Springer, pp 112–121

  • Kasamatsu K, Matsuda T, Emura K, Attrapadung N, Hanaoka G, Imai H (2012) Time-specific encryption from forward-secure encryption. In: Security and cryptography for networks, vol 7485. Springer, Heidelberg, pp 184–204

  • Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354

    Article  Google Scholar 

  • Lai J, Deng RH, Yang Y, Weng J (2014) Adaptable ciphertext-policy attribute-based encryption. In: Pairing-based cryptography—pairing 2013. Springer, pp 199–214

  • May T (1993) Time-release crypto, Manuscript. http://www.cyphernet.org/cyphernomicon/chapter14/14.5.html

  • Mora Afonso V, Carballero-Gil P (2014) Using identity-based cryptography in mobile applications. In: International joint conference SOCO’13-CISIS’13-ICEUTE’13, 239. Springer, pp 527–536

  • Muñoz AM, Rodríguez AF, Encinas LH, Alcázar BA (2013) A toolbox for dpa attacks to smart cards. In: International joint conference SOCO. Springer, pp 399–408

  • Paterson KG, Quaglia EA (2010) Time-specific encryption. In: Garay JA, De Prisco R (eds) Security and cryptography for networks. Springer, Berlin, pp 1–16

  • Rivest RL, Shamir A, Wagner DA (1996) Time-lock puzzles and timed-release crypto. Technical report, MIT, MA

  • Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Advances in cryptology—EUROCRYPT 2005. Springer, pp 457–473

  • Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Public key cryptography—international conference on practice and theory of public-key cryptography 2011. Springer, pp 53–70

  • Weng J, Deng RH, Ding X, Chu CK, Lai J (2009) Conditional proxy re-encryption secure against chosen-ciphertext attack. In: Proceedings of the 4th international symposium on information, computer, and communications security. ACM, pp 322–332

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Siqi Ma.

Ethics declarations

Conflict of interest

The authors declare that there is no conflict of interest.

Additional information

Communicated by V. Loia.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ma, S., Lai, J., Deng, R.H. et al. Adaptable key-policy attribute-based encryption with time interval. Soft Comput 21, 6191–6200 (2017). https://doi.org/10.1007/s00500-016-2177-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-016-2177-z

Keywords

Navigation