Skip to main content

An Efficient and Privacy Preserving CP-ABE Scheme for Internet-Based Collaboration

  • Conference paper
  • First Online:
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2017)

Abstract

The development of Internet applications facilitates enterprises and individuals to share information and work together across physical barriers. In such environment, flexible and efficient data-protection methods are required because data are out of the control domain of its owners. By encrypting with an access policy, ciphertext-policy attribute-based encryption (CP-ABE) can simultaneously achieve data encryption and access control, making it an ideal mechanism for data protection in Internet-based environments. However, the existing CP-ABE schemes usually have limitations regarding efficiency and privacy leakage from the access policy. In this paper, we propose a CP-ABE scheme with hidden access policy and fast decryption that improves the decryption efficiency and preserves the privacy of the access policy. In addition, by adopting dual-system encryption methodology, our scheme achieves full security, which is a higher security level in CP-ABE. The performance analysis revealed that the comprehensive capability of our scheme outperforms the existing CP-ABE schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Full security overcomes the weakness of selective security; i.e., it does not require the attacker to declare the challenged access policy in advance.

References

  1. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334. IEEE, Washington, DC (2007)

    Google Scholar 

  2. Rao, Y.S., Dutta, R.: Recipient anonymous ciphertext-policy attribute based encryption. In: Bagchi, A., Ray, I. (eds.) ICISS 2013. LNCS, vol. 8303, pp. 329–344. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-45204-8_25

    Chapter  Google Scholar 

  3. Li, X., Gu, D., Ren, Y., Ding, N., Yuan, K.: Efficient ciphertext-policy attribute based encryption with hidden policy. In: Xiang, Y., Pathan, M., Tao, X., Wang, H. (eds.) IDCS 2012. LNCS, vol. 7646, pp. 146–159. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34883-9_12

    Chapter  Google Scholar 

  4. Doshi, N., Jinwala, D.: Hidden access structure ciphertext policy attribute based encryption with constant length ciphertext. In: Thilagam, P.S., Pais, A.R., Chandrasekaran, K., Balakrishnan, N. (eds.) ADCONS 2011. LNCS, vol. 7135, pp. 515–523. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29280-4_60

    Chapter  Google Scholar 

  5. Padhya, M., Jinwala, D.: A novel approach for searchable CP-ABE with hidden ciphertext-policy. In: Prakash, A., Shyamasundar, R. (eds.) ICISS 2014. LNCS, vol. 8880, pp. 167–184. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-13841-1_10

    Chapter  Google Scholar 

  6. Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: Bellovin, S.M., Gennaro, R., Keromytis, A., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 111–129. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-68914-0_7

    Chapter  Google Scholar 

  7. Zhou, Z., Huang, D., Wang, Z.: Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans. Comput. 64(1), 126–138 (2015)

    Article  MathSciNet  Google Scholar 

  8. Li, J., Wang, H., Zhang, Y., Shen, J.: Ciphertext-policy attribute-based encryption with hidden access policy and testing. KSII Trans. Internet Inf. Syst. 10(7), 3339–3352 (2016)

    Google Scholar 

  9. Hur, J.: Attribute-based secure data sharing with hidden policies in smart grid. IEEE Trans. Parallel Distrib. Syst. 24(11), 2171–2180 (2013)

    Article  Google Scholar 

  10. Lai, J., Deng, R.H., Li, Y.: Fully secure cipertext-policy hiding CP-ABE. In: Bao, F., Weng, J. (eds.) ISPEC 2011. LNCS, vol. 6672, pp. 24–39. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21031-0_3

    Chapter  Google Scholar 

  11. Lai, J., Deng, R.H., Li, Y.: Expressive CP-ABE with partially hidden access structures. In: 7th ACM Symposium on Information, Computer and Communications Security, pp. 18–19. ACM, New York (2012)

    Google Scholar 

  12. Lewko, A., Waters, B.: New proof methods for attribute-based encryption: achieving full security through selective techniques. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 180–198. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32009-5_12

    Chapter  Google Scholar 

  13. Emura, K., Miyaji, A., Nomura, A., Omote, K., Soshi, M.: A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 13–23. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00843-6_2

    Chapter  Google Scholar 

  14. Miyaji, A., Tran, P.V.X.: Constant-ciphertext-size dual policy attribute based encryption. In: Xiang, Y., Lopez, J., Kuo, C.-C.J., Zhou, W. (eds.) CSS 2012. LNCS, vol. 7672, pp. 400–413. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-35362-8_30

    Chapter  Google Scholar 

  15. Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535–554. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-70936-7_29

    Chapter  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (Grant No. 61170088) and the Foundation of the State Key Laboratory of Software Development Environment (Grant No. SKLSDE-2015ZX-05).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jinmiao Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, J., Lang, B. (2018). An Efficient and Privacy Preserving CP-ABE Scheme for Internet-Based Collaboration. In: Romdhani, I., Shu, L., Takahiro, H., Zhou, Z., Gordon, T., Zeng, D. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 252. Springer, Cham. https://doi.org/10.1007/978-3-030-00916-8_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00916-8_46

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00915-1

  • Online ISBN: 978-3-030-00916-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics