Abstract
With the development of cloud computing application, attribute-based encryption (ABE) with flexibly fine-grained data access control is widely adopted. However, traditional data access structures are mainly constructed on independent and fixed attribute values. The data access policies in traditional ABE schemes don’t express the relationship of different attributes and the dynamic attribute values. Those seriously restrict wider application of ABE techonlogy. To resolve the problem, condition expression (CE) is first adopted to describe the demanded condition of attribute variables, which also includes combination operation related to many different attribute variables. A rule of CE is established to generate a concreted CE with unique form for an attribute condition. A running function of CE is presented to judge whether the related attribute values satisfy the specified CE automatically. In this article, we provide a ciphertext-policy ABE scheme which adopts the and-gate multi-value attribute access structure with additional CE (and-gate-CE), which has constant ciphertext length and can be proven CPA-secure under the decision q-BDHE assumption in random oracle model. Our scheme realizes to provide a more general data access policy with complicated and flexible CE in and-gate multi-value ABE scheme.


Similar content being viewed by others
References
Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol 3494, pp 457–473. https://doi.org/10.1007/11426639_27
Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp 89–98. https://doi.org/10.1145/1180405.1180418
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In 2007 IEEE symposium on security and privacy, pp 321–334. https://doi.org/10.1109/SP.2007.11
Cheung L, Newport C (2007) Provably secure ciphertext policy ABE. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp 456–465. https://doi.org/10.1145/1315245.1315302
Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp 195–203. https://doi.org/10.1145/1315245.1315270
Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol 6110, pp 62–91. https://doi.org/10.1007/978-3-642-13190-5_4
Yang K, Jia X (2012) Attributed-based access control for multi-authority systems in cloud storage. In: International Conference on Distributed Computing Systems. IEEE Computer Society, pp 536–545. https://doi.org/10.1109/ICDCS.2012.42
Doshi N, Jinwala D (2011) Constant ciphertext length in multi-authority ciphertext policy attribute-based encryption. In: The 2nd International Conference, Computer and Communication Technology (ICCCT), pp 451–456. https://doi.org/10.1109/ICCCT.2011.6075139
Yang K, Jia X, Ren K (2013) Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp 523–528. https://doi.org/10.1145/2484313.2484383
Beime A (1996) Secure schemes for secret sharing and key distribution. PhD dissertation
Chen Y, Song L, Yang G (2016) Attribute-based access control for multi-authority systems with constant size ciphertext in cloud computing. China Commun J 13:146–162
Chase M (2007) Multi-authority attribute based encryption. Theory Cryptogr Conf 4392:515–534. https://doi.org/10.1007/978-3-540-70936-7_28
Kumaresan S, Shanmugam V (2020) Time-variant attribute-based multitype encryption algorithm for improved cloud data security using user profile. J Supercomput 76:6094–6112. https://doi.org/10.1007/s11227-019-03118-8
Raja J, Ramakrishnan M (2020) Confidentiality-preserving based on attribute encryption using auditable access during encrypted records in cloud location. J Supercomput 76:6026–6039. https://doi.org/10.1007/s11227-019-03111-1
Ibrahim MH, Kumari S, Das AK et al (2018) Attribute-based authentication on the cloud for thin clients. J Supercomput 74:5813–5845. https://doi.org/10.1007/s11227-016-1948-8
Tembhare A, Sibi Chakkaravarthy S, Sangeetha D et al (2019) Role-based policy to maintain privacy of patient health records in cloud. J Supercomput 75:5866–5881. https://doi.org/10.1007/s11227-019-02887-6
He D, Kumar N, Wang H, Wang L, Choo KKR, Vinel A (2018) A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network. IEEE Trans Depend Secure Comput 15:633–645
Zhang Y, Li J, Zheng D, Chen X, Li H (2017) Towards privacy protection and malicious behavior traceability in smart health. Pers Ubiquit Comput 21:815–830
Shokri M, Mirabi M (2019) An efficient stream structure for broadcasting the encrypted XML data in mobile wireless broadcast channels. J Supercomput 75:7147–7173. https://doi.org/10.1007/s11227-019-02920-8
Li J, Yu Q, Zhang Y (2019) Hierarchical attribute based encryption with continuous leakage-resilience. Inf Sci 484:113–134. https://doi.org/10.1016/j.ins.2019.01.052
Li J, Lin D, Squicciarini AC, Li J, Jia C (2017) Towards privacy-preserving storage and retrieval in multiple clouds. IEEE Trans Cloud Comput 5(3):499–509
Ahuja R, Mohanty SK (2017) A scalable attribute-based access control scheme with flexible delegation cum sharing of access privileges for cloud storage. IEEE Trans Cloud Comput 8:32–44. https://doi.org/10.1109/TCC.2017.2751471
Belguith S, Kaaniche N, Laurent M, Jemai A, Attia R (2018) Phoabe: securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot. Comput Netw 133:141–156. https://doi.org/10.1016/j.comnet.2018.01.036
Sun J, Su Y, Qin J, Hu J, Ma J (2019) Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Trans Cloud Comput 99:1
Namasudra S (2019) An improved attribute-based encryption technique towards the data security in cloud computing. Concurr Comput Pract Exp 108:37–52. https://doi.org/10.1016/j.jnca.2018.02.009
Joshi M, Joshi K, Finin T (2018) Attribute based encryption for secure access to cloud based EHR systems. In: 2018 IEEE 11th International Conference on Cloud Computing, pp 932–935. https://doi.org/10.1109/CLOUD.2018.00139
Li J, Yu Q, Zhang Y, Shen J (2019) Key-policy attribute-based encryption against continual auxiliary input leakage. Inf Sci 470:175–188. https://doi.org/10.1016/j.ins.2018.07.077
Attrapadung N, Hanaoka G, Ogawa K, Ohtake G, Watanabe H, Yamada S (2018) Attribute-based encryption for range attributes. IEICE Trans Fundam Electron Commun Comput Sci 101(9):1440–1455
Rasori M, Perazzo P, Dini G (2020) A lightweight and scalable attribute-based encryption system for smart cities. Comput Commun 149:78–89. https://doi.org/10.1016/j.comcom.2019.10.005
Jiang Y, Susilo W, Mu Y, Guo F (2018) Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Futur Gener Comput Syst 78:720–729. https://doi.org/10.1016/j.future.2017.01.026
Wang H, Song Y (2018) Secure cloud-based EHR system using attribute-based cryptosystem and blockchain. J Med Syst 42:1–9. https://doi.org/10.1007/s10916-018-0994-6
Liu J K, Yuen T H, Zhang P, Liang K (2018) Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list. In: International Conference on Applied Cryptography and Network Security, vol 10892, pp 516–534. https://doi.org/10.1007/978-3-319-93387-0_27
Ge A J, Zhang R, Chen C (2012) Thresholdciphertext policy attribute-based encryption with constant size ciphertexts. In: Information Security and Privacy—Seventeenth Australasian Conference, pp 336–349. https://doi.org/10.1007/978-3-642-31448-3_25
Odelu V, Das AK, Rao YS, Kumari S, Khan MK, Choo KKR (2017) Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Comput Stand Interfaces 54:3–9. https://doi.org/10.1016/j.csi.2016.05.002
Guo F, Mu Y, Susilo W, Wong DS, Varadharajan V (2014) CP-ABE with constant-size keys for lightweight devices. IEEE Trans Inf Forensics Secur 9:763–771. https://doi.org/10.1109/TIFS.2014.2309858
Feldman P (1987) A practical scheme for non-interactive verifiable secret sharing. In: 28th Annual Symposium on Foundations of Computer Science, pp 427–438. https://doi.org/10.1109/SFCS.1987.4
Xue K, Hong J, Xue Y, Wei DS, Yu N, Hong P (2017) CABE: a new comparable attribute-based encryption construction with 0-encoding and 1-encoding. IEEE Trans Comput 66:1491–1503. https://doi.org/10.1109/TC.2017.2693265
Lynn B (2013) Pairing-based cryptography (PBC) library. http://crypto.stanford.edu/pbc
Acknowledgements
This work was supported in the science and technology project of education department of Jiangxi Province in China (GJJ201402), the key research and development project of science department in Jiangxi province in China (20171BBE50065) and the project “Research on technology and application of attribute-based encryption based on attached attribute conditional access policy” of National Natural Science Foundation in China.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Hu, S., Wang, X., He, H. et al. Complex and flexible data access policy in attribute-based encryption. J Supercomput 78, 1010–1029 (2022). https://doi.org/10.1007/s11227-021-03867-5
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-021-03867-5