Abstract
In this paper, we introduce a new cryptographic primitive: adaptable KP-ABE with time interval (KP-TIABE), which is an extension of key-policy attribute-based encryption (KP-ABE). Adaptable KP-TIABE specifies a decryption time interval for every ciphertext such that the ciphertext can only be decrypted within this time interval. To be more flexible, the decryption time interval associated with a ciphertext can be adjusted on demand by a semi-trusted server. We propose a formal model for adaptable KP-TIABE, present a concrete adaptable KP-TIABE scheme and prove its security under the security model.
Similar content being viewed by others
References
Beimel A (1996) Secure schemes for secret sharing and key distribution. PhD thesis, PhD thesis, Israel Institute of Technology, Technion, Haifa, Israel
Blake IF, Chan ACF (2004) Scalable, server-passive, user-anonymous timed release public key encryption from bilinear pairing. In: IACR cryptology ePrint archive, 2004, p 211
Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Advances in cryptology—EUROCRYPT’98. Springer, pp 127–144
Boneh D, Boyen X, Goh E-J (2005) Hierarchical identity based encryption with constant size ciphertext. In: Advances in cryptology—EUROCRYPT 2005. Springer, pp 440–456
Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 89–98
Jakobsson M (1999) On quorum controlled asymmetric proxy re-encryption. In: Public key cryptography, vol 1560. Springer, pp 112–121
Kasamatsu K, Matsuda T, Emura K, Attrapadung N, Hanaoka G, Imai H (2012) Time-specific encryption from forward-secure encryption. In: Security and cryptography for networks, vol 7485. Springer, Heidelberg, pp 184–204
Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354
Lai J, Deng RH, Yang Y, Weng J (2014) Adaptable ciphertext-policy attribute-based encryption. In: Pairing-based cryptography—pairing 2013. Springer, pp 199–214
May T (1993) Time-release crypto, Manuscript. http://www.cyphernet.org/cyphernomicon/chapter14/14.5.html
Mora Afonso V, Carballero-Gil P (2014) Using identity-based cryptography in mobile applications. In: International joint conference SOCO’13-CISIS’13-ICEUTE’13, 239. Springer, pp 527–536
Muñoz AM, Rodríguez AF, Encinas LH, Alcázar BA (2013) A toolbox for dpa attacks to smart cards. In: International joint conference SOCO. Springer, pp 399–408
Paterson KG, Quaglia EA (2010) Time-specific encryption. In: Garay JA, De Prisco R (eds) Security and cryptography for networks. Springer, Berlin, pp 1–16
Rivest RL, Shamir A, Wagner DA (1996) Time-lock puzzles and timed-release crypto. Technical report, MIT, MA
Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Advances in cryptology—EUROCRYPT 2005. Springer, pp 457–473
Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Public key cryptography—international conference on practice and theory of public-key cryptography 2011. Springer, pp 53–70
Weng J, Deng RH, Ding X, Chu CK, Lai J (2009) Conditional proxy re-encryption secure against chosen-ciphertext attack. In: Proceedings of the 4th international symposium on information, computer, and communications security. ACM, pp 322–332
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that there is no conflict of interest.
Additional information
Communicated by V. Loia.
Rights and permissions
About this article
Cite this article
Ma, S., Lai, J., Deng, R.H. et al. Adaptable key-policy attribute-based encryption with time interval. Soft Comput 21, 6191–6200 (2017). https://doi.org/10.1007/s00500-016-2177-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-016-2177-z