Transformation between Attribute-Based Encryption and Key-Aggregate Cryptosystem

Generic construction of cryptographic primitives is a way to connect two research areas. The problems in one area may be solved in the other area if such connections are built. In this manuscript, two generic constructions of attribute-based primitives are proposed. First, we give a bi-directional conversion between a key-aggregate cryptosystem and a key-policy attribute-based encryption with OR-gate-only access structures. Second, we give a generic construction of a ciphertext-policy attribute-based key encapsulation mechanism (CP-ABKEM) from a key-aggregate key encapsulation mechanism. Moreover, the proposed CP-ABKEM supports expressive access structures. Based on our conversion, we can construct the first ciphertext-policy attribute based key encapsulation mechanism with constant-size private keys.

[1]  Rafail Ostrovsky,et al.  Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.

[2]  R. Kalaiselvi,et al.  SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING , 2016 .

[3]  Atsuko Miyaji,et al.  A ciphertext-policy attribute-based encryption scheme with constant ciphertext length , 2010, Int. J. Appl. Cryptogr..

[4]  Yao Zheng,et al.  Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.

[5]  Gaikwad Prajakta,et al.  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage , 2015 .

[6]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[7]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[8]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[9]  Fuchun Guo,et al.  CP-ABE With Constant-Size Keys for Lightweight Devices , 2014, IEEE Transactions on Information Forensics and Security.

[10]  Changji Wang,et al.  An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length , 2013 .

[11]  Ling Cheung,et al.  Provably secure ciphertext policy ABE , 2007, CCS '07.

[12]  Vanga Odelu,et al.  Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography , 2016, Secur. Commun. Networks.

[13]  Wu Qiuxin,et al.  A generic construction of ciphertext-policy attribute-based encryption supporting attribute revocation , 2014, China Communications.

[14]  Xiaohui Liang,et al.  Provably secure and efficient bounded ciphertext policy attribute based encryption , 2009, ASIACCS '09.

[15]  Milan Petkovic,et al.  Secure management of personal health records by applying attribute-based encryption , 2009, Proceedings of the 6th International Workshop on Wearable, Micro, and Nano Technologies for Personalized Health.

[16]  Chih-Wen Lin,et al.  Attribute-Based Encryption from Identity-Based Encryption , 2017, IACR Cryptol. ePrint Arch..

[17]  Alexander W. Dent,et al.  A Brief History of Provably-Secure Public-Key Encryption , 2008, AFRICACRYPT.

[18]  P. MuraliKrishna,et al.  SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL'S EQUATION , 2013 .

[19]  Kim-Kwang Raymond Choo,et al.  Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts , 2017, IEEE Access.

[20]  Nuttapong Attrapadung,et al.  Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2011, Public Key Cryptography.

[21]  David Pointcheval,et al.  Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms , 2016, IACR Cryptol. ePrint Arch..

[22]  Mihir Bellare,et al.  Randomness Re-use in Multi-recipient Encryption Schemeas , 2003, Public Key Cryptography.

[23]  Javier Herranz Attribute-based encryption implies identity-based encryption , 2017, IET Inf. Secur..

[24]  Amit Sahai,et al.  Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.

[25]  Jie Wu,et al.  Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.