Attribute-Based Encryption from Identity-Based Encryption

Ciphertext-policy attribute-based encryption (CP-ABE) is an access control mechanism where a data provider encrypts a secret message and then sends the ciphertext to the receivers according to the access policy which she/he decides. If the attributes of the receivers match the access policy, then they can decrypt the ciphertext. This paper shows a relation between ABE and identity-based encryption (IBE), and presents a bi-directional conversion between an access structure and identities. By the proposed conversion, the ABE scheme constructed from an IBE scheme will inherit the features, such as constant-size ciphertexts and anonymity, from the IBE scheme, and vice versa. It turns out that the proposed conversion also gives the first ABE achieving access structures with wildcard and constant-size ciphertexts/private keys. Finally, we prove the CCA security for confidentiality and anonymity.

[1]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[2]  Xiaohui Liang,et al.  Provably secure and efficient bounded ciphertext policy attribute based encryption , 2009, ASIACCS '09.

[3]  Robert H. Deng,et al.  Fully Secure Cipertext-Policy Hiding CP-ABE , 2011, ISPEC.

[4]  Rafail Ostrovsky,et al.  Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.

[5]  Wenjing Lou,et al.  Attribute-based content distribution with hidden policy , 2008, 2008 4th Workshop on Secure Network Protocols.

[6]  Zhiwei Wang,et al.  CP-ABE with Hidden Policy from Waters Efficient Construction , 2016, Int. J. Distributed Sens. Networks.

[7]  Stefan Katzenbeisser,et al.  Hiding the Policy in Cryptographic Access Control , 2011, STM.

[8]  Qing Wu,et al.  Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups , 2012, Math. Comput. Model..

[9]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[10]  Aggelos Kiayias,et al.  Lower Bounds for Private Broadcast Encryption , 2012, Information Hiding.

[11]  Brent Waters,et al.  Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) , 2006, CRYPTO.

[12]  Ratna Dutta,et al.  Recipient Anonymous Ciphertext-Policy Attribute Based Encryption , 2013, ICISS.

[13]  Fuchun Guo,et al.  CP-ABE With Constant-Size Keys for Lightweight Devices , 2014, IEEE Transactions on Information Forensics and Security.

[14]  K. Kuppusamy,et al.  Privacy Preserving Ciphertext Policy Attribute Based Encryption , 2010, CNSA.

[15]  Ling Cheung,et al.  Provably secure ciphertext policy ABE , 2007, CCS '07.

[16]  Cécile Delerablée,et al.  Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys , 2007, ASIACRYPT.

[17]  Guomin Yang,et al.  POSTER: Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption , 2014, CCS.

[18]  Devesh C. Jinwala,et al.  A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy , 2014, ICISS.

[19]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[20]  Jin Li,et al.  Efficient attribute-based data sharing in mobile clouds , 2016, Pervasive Mob. Comput..

[21]  Kazuki Yoneyama,et al.  Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures , 2008, ACNS.

[22]  Umesh Chandra Yadav,et al.  Ciphertext-policy attribute-based encryption with hiding access structure , 2015, 2015 IEEE International Advance Computing Conference (IACC).

[23]  Guomin Yang,et al.  Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions , 2016, IEEE Transactions on Information Forensics and Security.

[24]  Nishant Doshi,et al.  Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext , 2011, ADCONS.

[25]  Cheng Chen,et al.  Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost , 2011, ProvSec.

[26]  Cheng Chen,et al.  Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures , 2013, CT-RSA.

[27]  Zhibin Zhou,et al.  On efficient ciphertext-policy attribute based encryption and broadcast encryption: extended abstract , 2010, CCS '10.

[28]  Amit Sahai,et al.  Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.

[29]  Yanli Ren,et al.  Efficient Ciphertext-Policy Attribute Based Encryption with Hidden Policy , 2012, IDCS.

[30]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[31]  Craig Gentry,et al.  Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.

[32]  Fugeng Zeng,et al.  Attribute-based encryption with hidden threshold access structure , 2017 .

[33]  Yang Wang,et al.  A Tree-Based CP-ABE Scheme with Hidden Policy Supporting Secure Data Sharing in Cloud Computing , 2013, 2013 International Conference on Advanced Cloud and Big Data.

[34]  K. Kuppusamy,et al.  Ciphertext Policy Attribute based Encryption with anonymous access policy , 2010, ArXiv.

[35]  Atsuko Miyaji,et al.  A ciphertext-policy attribute-based encryption scheme with constant ciphertext length , 2010, Int. J. Appl. Cryptogr..

[36]  Javier Herranz,et al.  Constant Size Ciphertexts in Threshold Attribute-Based Encryption , 2010, Public Key Cryptography.

[37]  Bo Lang,et al.  A CP-ABE scheme with hidden policy and its application in cloud computing , 2016, Int. J. Cloud Comput..

[38]  P. MuraliKrishna,et al.  SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL'S EQUATION , 2013 .

[39]  Cheng Chen,et al.  Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts , 2012, ACISP.

[40]  Jin Li,et al.  Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2014, ProvSec.

[41]  Nuttapong Attrapadung,et al.  Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2011, Public Key Cryptography.

[42]  Phuong Viet Xuan Tran,et al.  Efficient Ciphertext-Policy ABE with constant ciphertext length , 2012, 2012 7th International Conference on Computing and Convergence Technology (ICCCT).