Skip to main content

Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Schemes with Fast Decryption

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9478))

Abstract

We present an efficient decentralized Attribute-Based Encryption (ABE) that supports any Monotone Access Structure (MAS) with faster decryption capability in the key-policy setting. We further extend our MAS construction to Non-Monotone Access Structure (nonMAS) in order to support negative attributes. A notable advantage of our nonMAS construction is that the computation cost during encryption and decryption, and the size of ciphertext are linear to the number of authorities involved in the system, not to the number of attributes used in the respective process unlike existing schemes. In addition, our schemes provide user privacy, enabling any user to obtain secret keys without disclosing its unique identity to the authorities. The security reduction of both the schemes rely on the decisional Bilinear Diffie-Hellman Exponent problem.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Chase, M., Chow, S.S.M.: Improving privacy and security in multi-authority attribute-based encryption. In: ACM Conference on Computer and Communications Security, pp. 121–130. ACM, New York (2009)

    Google Scholar 

  2. Han, J., Susilo, W., Mu, Y., Yan, J.: Privacy-preserving decentralized key-policy attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 23(11), 2150–2162 (2012)

    Article  Google Scholar 

  3. Lin, H., Cao, Z.-F., Liang, X., Shao, J.: Secure threshold multi authority attribute based encryption without a central authority. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 426–436. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  4. Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515–534. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  5. Li, Q.Y., Xiong, H., Zhang, F.L., Zeng, S.K.: An expressive decentralizing KP-ABE scheme with constant-size ciphertext. Int. J. Netw. Secur. 15(3), 131–140 (2013)

    Google Scholar 

  6. Ge, A., Zhang, J., Zhang, R., Ma, C., Zhang, Z.: Security analysis of a privacy-preserving decentralized key-policy attribute-based encryption scheme. IEEE Trans. Parallel Distrib. Syst. 24(11), 2319–2321 (2013)

    Article  Google Scholar 

Download references

Acknowledgement

The authors would like to thank the anonymous reviewers of this paper for their valuable comments and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Y. Sreenivasa Rao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Rao, Y.S. (2015). Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Schemes with Fast Decryption. In: Jajoda, S., Mazumdar, C. (eds) Information Systems Security. ICISS 2015. Lecture Notes in Computer Science(), vol 9478. Springer, Cham. https://doi.org/10.1007/978-3-319-26961-0_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26961-0_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26960-3

  • Online ISBN: 978-3-319-26961-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics