Improving Privacy-Preserving CP-ABE with Hidden Access Policy

User’s privacy-preserving has become an urgent problem with the rapid development of cloud technologies. Anonymous ciphertext-policy Attribute Based Encryption (CP-ABE) not only protects the security of data, but also ensures that the privacy of the data user is not compromised. However, most of the known schemes have some shortcomings where those schemes either cannot achieve compact security or are inefficient in Encryption and Decryption. Additionally, recent works show the reality of the anonymity in some proposed schemes is doubtful. To address the problems above, we use the double exponent technique to construct an anonymous CP-ABE scheme which is more compact than the results at present. The proposed scheme with hidden access policy works in prime order groups. Meanwhile, we prove the security of our scheme under the decisional n-BDHE and decisional linear assumption.

[1]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[2]  Brent Waters,et al.  Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) , 2006, CRYPTO.

[3]  Ratna Dutta,et al.  Recipient Anonymous Ciphertext-Policy Attribute Based Encryption , 2013, ICISS.

[4]  Jinshu Su,et al.  An Efficient Searchable Encryption Against Keyword Guessing Attacks for Sharable Electronic Medical Records in Cloud-based System , 2016, Journal of Medical Systems.

[5]  Dong Hoon Lee,et al.  Anonymous HIBE: Compact Construction Over Prime-Order Groups , 2013, IEEE Trans. Inf. Theory.

[6]  Jiguo Li,et al.  Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing , 2016, KSII Trans. Internet Inf. Syst..

[7]  Koutarou Suzuki,et al.  Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts , 2011, IACR Cryptol. ePrint Arch..

[8]  Guomin Yang,et al.  Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions , 2016, IEEE Transactions on Information Forensics and Security.

[9]  Kazuki Yoneyama,et al.  Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures , 2008, ACNS.

[10]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[11]  Robert H. Deng,et al.  Fully Secure Cipertext-Policy Hiding CP-ABE , 2011, ISPEC.

[12]  Jin Li,et al.  Privacy-Aware Attribute-Based Encryption with User Accountability , 2009, ISC.

[13]  Robert H. Deng,et al.  Expressive CP-ABE with partially hidden access structures , 2012, ASIACCS '12.

[14]  Craig Gentry,et al.  Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.

[15]  Yi Mu,et al.  Privacy-Preserving and Secure Sharing of PHR in the Cloud , 2016, Journal of Medical Systems.

[16]  Jin Li,et al.  Anonymous attribute-based encryption supporting efficient decryption test , 2013, ASIA CCS '13.

[17]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[18]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[19]  Hovav Shacham,et al.  Short Group Signatures , 2004, CRYPTO.

[20]  Allison Bishop,et al.  Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.

[21]  Atsuko Miyaji,et al.  A ciphertext-policy attribute-based encryption scheme with constant ciphertext length , 2009, Int. J. Appl. Cryptogr..