Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data

In the ciphertext-policy attribute based encryption (CPABE) scheme, a private key holder is related with a set of attributes while the data is encrypted under an access structure defined by the data provider. In most proposed schemes, the characteristics of the attributes are treated as same level. While in the real world circumstance, the attributes are always in the different levels. In this paper, In this paper, a scheme is proposed under a different hierarchy of attributes with the name of ciphertext-policy hierarchical attribute based encryption. The CP-HABE scheme is proved to be secure under the decisional q-parallel bilinear Diffie-Hellman exponent assumption, which can be considered as the generalization of the traditional CP-ABE.

[1]  Dongqing Xie,et al.  Attribute-based signature and its applications , 2010, ASIACCS '10.

[2]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[3]  Manoj Prabhakaran,et al.  Attribute-Based Signatures , 2011, CT-RSA.

[4]  Ling Cheung,et al.  Provably secure ciphertext policy ABE , 2007, CCS '07.

[5]  Rafail Ostrovsky,et al.  Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.

[6]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..

[7]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[8]  Tamir Tassa,et al.  Hierarchical Threshold Secret Sharing , 2004, Journal of Cryptology.

[9]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[10]  Dan Boneh,et al.  Secure Identity Based Encryption Without Random Oracles , 2004, CRYPTO.

[11]  Cong Wang,et al.  Enhancing Attribute-Based Encryption with Attribute Hierarchy , 2009, 2009 Fourth International Conference on Communications and Networking in China.

[12]  Reihaneh Safavi-Naini,et al.  Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems , 2009, AFRICACRYPT.

[13]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[14]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[15]  Brent Waters,et al.  Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.

[16]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[17]  Jin Li,et al.  Attribute-Based Ring Signatures , 2008, IACR Cryptol. ePrint Arch..

[18]  Amit Sahai,et al.  Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.

[19]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[20]  Dalia Khader,et al.  Attribute Based Group Signatures , 2007, IACR Cryptol. ePrint Arch..