skip to main content
10.1145/3017971.3017981acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccnsConference Proceedingsconference-collections
research-article

Fully Secure Hidden Ciphertext Policy Attribute-Based Encryption with Short Ciphertext Size

Published: 26 November 2016 Publication History

Abstract

In ciphertext policy attribute-based encryption scheme, access policies are associated with ciphertext and tied to it. It is necessary to hide the access policy in the most sensitive spots such as political, medical and economic fields, that is, receiver's anonymity. In this paper, we propose an efficient CP-ABE construction with hidden policy and prove it to be fully secure under static assumptions applying the dual system encryption methodology. Access structures in our construction are AND gates on positive, negative and wildcard attributes and the ciphertext size is short, which is only concerned with the number of wildcards.

References

[1]
Nishide T., Yoneyama K., Ohta K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: International Conference on Applied Cryptography and Network Security, pp. 111--129 (2008)
[2]
Doshi N., Jinwala D.: Hidden access structure ciphertext policy attribute based encryption with constant length ciphertext. In: International Conference on Advanced Computing, Networking and Security, pp. 515--523 (2011).
[3]
Li J., Ren K., Zhu B., Wan Z.: Privacy-aware attribute-based encryption with user accountability. In: Information Security, pp. 347--362 (2009)
[4]
Li X., Gu D., Ren Y., et al.: Efficient ciphertext-policy attribute based encryption with hidden policy. In: International Conference on Internet and Distributed Computing Systems, pp. 146--159 (2012).
[5]
Qian H., Li J., Zhang Y.: Privacy-preserving decentralized ciphertext-policy attribute-based encryption with fully hidden access structure. In: International Conference on Information and Communications Security, pp. 363--372 (2013)
[6]
Phuong T. V. X., Yang G., Susilo W.: Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions. In: IEEE Transactions on Information Forensics and Security11, no. 1, pp. 35--45 (2016)
[7]
Lai J., Deng R. H., Li Y.: Fully secure cipertext-policy hiding CP-ABE. In: International Conference on Information Security Practice and Experience, pp. 24--39 (2011).
[8]
Waters B.: Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. In: Advances in Cryptology-CRYPTO, pp. 619--636 (2009).
[9]
Lewko A., Okamoto T., Sahai A., et al.: Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 62--91 (2010).
[10]
Sahai A., Waters B.: Fuzzy identity-based encryption. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457--473 (2005)
[11]
Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: ACM Conference on Computer and Communications Security, pp. 456--465 (2007)
[12]
Boneh D., Waters B.: Conjunctive, subset, and range queries on encrypted data. In: Theory of Cryptography Conference, pp. 535--554 (2007)
[13]
Katz J., Sahai A., Waters B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 146--162 (2008)
[14]
Balu A., Kuppusamy K.: Ciphertext policy attribute based encryption with anonymous access policy. CoRR abs/1011.0527, (2010)
[15]
Lewko A., Waters B.: New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Theory of Cryptography Conference, pp. 455--479 (2010).
[16]
Okamoto T., Takashima K.: Fully secure functional encryption with general relations from the decisional linear assumption. In: Annual Cryptology Conference. Springer Berlin Heidelberg, pp. 191--208 (2010)
[17]
Freeman D. M.: Converting pairing-based cryptosystems from composite-order groups to prime-order groups. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 44--61 (2010)
[18]
Ge A., Zhang R., Chen C., et al.: Threshold ciphertext policy attribute-based encryption with constant size ciphertexts. In: Australasian Conference on Information Security and Privacy, pp. 336--349 (2012)

Cited By

View all
  • (2024)Secure Information in Cloud Storage Using Hierarchical-authority Attribute-Based Encryption (HABE): A Literature ReviewKnE Social Sciences10.18502/kss.v9i6.15283Online publication date: 12-Mar-2024
  • (2023)A Brief Review on Attribute-Based Encryption ApproachesSSRN Electronic Journal10.2139/ssrn.4526403Online publication date: 2023
  • (2023)Blockchain-Based Ciphertext Policy-Hiding Access Control SchemeSecurity and Privacy in Communication Networks10.1007/978-3-031-25538-0_15(272-289)Online publication date: 4-Feb-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICCNS '16: Proceedings of the 6th International Conference on Communication and Network Security
November 2016
133 pages
ISBN:9781450347839
DOI:10.1145/3017971
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 November 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. attribute based encryption
  2. ciphertext policy
  3. dual system
  4. fully secure
  5. hidden ciphertext policy

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICCNS '16

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)1
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Secure Information in Cloud Storage Using Hierarchical-authority Attribute-Based Encryption (HABE): A Literature ReviewKnE Social Sciences10.18502/kss.v9i6.15283Online publication date: 12-Mar-2024
  • (2023)A Brief Review on Attribute-Based Encryption ApproachesSSRN Electronic Journal10.2139/ssrn.4526403Online publication date: 2023
  • (2023)Blockchain-Based Ciphertext Policy-Hiding Access Control SchemeSecurity and Privacy in Communication Networks10.1007/978-3-031-25538-0_15(272-289)Online publication date: 4-Feb-2023
  • (2022)Secure Outsourced Attribute-Based Sharing Framework for Lightweight Devices in Smart Health SystemsIEEE Transactions on Services Computing10.1109/TSC.2021.307374015:5(3019-3030)Online publication date: 1-Sep-2022
  • (2022)Toward Secure and Privacy-Preserving Cloud Data Sharing: Online/Offline Multiauthority CP-ABE With Hidden PolicyIEEE Systems Journal10.1109/JSYST.2022.316960116:3(4804-4815)Online publication date: Sep-2022
  • (2022)CASE: A Context-Aware Security Scheme for Preserving Data Privacy in IoT-Enabled Society 5.0IEEE Internet of Things Journal10.1109/JIOT.2021.31011159:4(2497-2504)Online publication date: 15-Feb-2022
  • (2021)Privacy-Preserving Flexible Access Control for Encrypted Data in Internet of ThingsIEEE Internet of Things Journal10.1109/JIOT.2021.30715538:19(14731-14745)Online publication date: 1-Oct-2021
  • (2021)A partially hidden policy CP-ABE scheme against attribute values guessing attacks with online privacy-protective decryption testing in IoT assisted cloud computingFuture Generation Computer Systems10.1016/j.future.2021.04.022123(181-195)Online publication date: Oct-2021
  • (2020)Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart HealthIEEE Internet of Things Journal10.1109/JIOT.2020.29742577:7(6566-6575)Online publication date: Jul-2020
  • (2020)RETRACTED ARTICLE: SybilWatch: a novel approach to detect Sybil attack in IoT based smart health careJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-020-02189-312:6(6199-6213)Online publication date: 12-Jun-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media