Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System

Since cloud computing has been playing an increasingly important role in real life, the privacy protection in many fields has been paid more and more attention, especially, in the field of personal health record (PHR). The traditional ciphertext-policy attribute-based encryption (CP-ABE) provides the fine-grained access control policy for encrypted PHR data, but the access policy is also sent along with ciphertext explicitly. However, the access policy will reveal the users’ privacy, because it contains too much sensitive information of the legitimate data users. Hence, it is important to protect users’ privacy by hiding access policies. In most of the previous schemes, although the access policy is hidden, they face two practical problems: 1) these schemes do not support large attribute universe, so their practicality in PHR is greatly limited and 2) the cost of decryption is especially high since the access policy is embedded in the ciphertext. To address these problems, we construct a CP-ABE scheme with efficient decryption, where both the size of public parameters and the cost of decryption are constant. Moreover, we also show that the proposed scheme achieves full security in the standard model under static assumptions by using the dual system encryption method.

[1]  Jiguo Li,et al.  Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing , 2016, KSII Trans. Internet Inf. Syst..

[2]  Yinghui Zhang,et al.  Anonymous Attribute-Based Encryption with Large Universe and Threshold Access Structures , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[3]  Chun-I Fan,et al.  Cryptanalysis on the Anonymity of Li et al.’s Ciphertext-Policy Attribute-Based Encryption Scheme , 2017 .

[4]  Yupu Hu,et al.  New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing , 2013, KSII Trans. Internet Inf. Syst..

[5]  Nishant Doshi,et al.  Improving Security in Multi Authority Attribute Based Encryption with Fast Decryption , 2016 .

[6]  Xinyu Feng,et al.  Fully Secure Hidden Ciphertext Policy Attribute-Based Encryption with Short Ciphertext Size , 2016, ICCNS.

[7]  Jiguo Li,et al.  Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation , 2014, International Journal of Information Security.

[8]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[9]  W. Marsden I and J , 2012 .

[10]  Zhiwei Wang,et al.  CP-ABE with Hidden Policy from Waters Efficient Construction , 2016, Int. J. Distributed Sens. Networks.

[11]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[12]  Qutaibah M. Malluhi,et al.  A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption , 2017, AsiaCCS.

[13]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[14]  Jin Li,et al.  Anonymous attribute-based encryption supporting efficient decryption test , 2013, ASIA CCS '13.

[15]  Y. Sreenivasa Rao,et al.  A secure and efficient Ciphertext-Policy Attribute-Based Signcryption for Personal Health Records sharing in cloud computing , 2017, Future Gener. Comput. Syst..

[16]  Jiguo Li,et al.  Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing , 2017, IEEE Transactions on Services Computing.

[17]  Rafail Ostrovsky,et al.  Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.

[18]  Qiang Wang,et al.  Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in Cloud Computing , 2018, IEEE Access.

[19]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[20]  Jian Shen,et al.  User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage , 2018, IEEE Systems Journal.

[21]  Umesh Chandra Yadav,et al.  Ciphertext-policy attribute-based encryption with hiding access structure , 2015, 2015 IEEE International Advance Computing Conference (IACC).

[22]  Guomin Yang,et al.  Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions , 2016, IEEE Transactions on Information Forensics and Security.

[23]  Robert H. Deng,et al.  Expressive CP-ABE with partially hidden access structures , 2012, ASIACCS '12.

[24]  Ximeng Liu,et al.  Fully Secure Decentralized Key-Policy Attribute-Based Encryption , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.

[25]  Robert H. Deng,et al.  Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control , 2018, IEEE Internet of Things Journal.

[26]  Brent Waters,et al.  Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..

[27]  Hongming Cai,et al.  The design of an m-Health monitoring system based on a cloud computing platform , 2017, Enterp. Inf. Syst..