Abstract
Ciphertext policy attribute based encryption (CP-ABE) systems are suitable for supporting access control with complex attribute-based policies. But there is a few CP-ABE systems that support non-monotonic access structures. In this paper we present an efficient CP-ABE construction which supports \(\mathbf {NOT}\) operation as well as m-of-n threshold gates. This construction is proved to be selectively secure under decisional bilinear Diffie-Hellman assumption. The comparison between our scheme and other similar systems shows that our construction is an efficient and expressive CP-ABE construction that supports the negation of attributes.
Y. Cheng is an engineer at National University of Defense Technology, Changsha, P. R. China. His current research interests include the storage security in public cloud services, trusted computing in public cloud or other un-trusted devices, cryptographic algorithm design for data security, data leakage prevention, etc.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Nag, A., Choudhary, S., Dawn, S., Basu, S.: Secure data outsourcing in the cloud using multi-secret sharing scheme. In: Mandal, J., Satapathy, S., Sanyal, M., Bhateja, V. (eds.) AISC, vol. 458, pp. 337–343. Springer, Singapore (2017). doi:10.1007/978-981-10-2035-3_34
Athira, R., Tina, S., Arun, R., Suvanam, S.: A survey on attribute based encryption schemes for data sharing. In: Proceedings of the 2016 International Conference on Emerging Trends in Engineering and Management, pp. 19–23 (2016)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). doi:10.1007/11426639_27
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp. 321–334. IEEE (2007)
Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 195–203. ACM (2007)
Naor, M., Pinkas, B.: Efficient trace and revoke schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 1–20. Springer, Heidelberg (2001). doi:10.1007/3-540-45472-1_1
Beimel, A.: Secure schemes for secret sharing and key distribution. Phd thesis, Israel Institute of Technology, Technion, Haifa, Israel (1996)
Lewko, A., Sahai, A., Waters, B.: Revocation systems with very small private keys. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, pp. 273–285. IEEE (2010)
Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 456–465. ACM (2007)
Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258–275. Springer, Heidelberg (2005). doi:10.1007/11535218_16
Vaikuntanathan, V., Voulgaris, P.: Attribute based encryption using lattices. U.S. Patent 9,281,944 (2016)
Brakerski, Z., Cash, D., Tsabary, R., Wee, H.: Targeted homomorphic attribute-based encryption. In: Hirt, M., Smith, A. (eds.) TCC 2016. LNCS, vol. 9986, pp. 330–360. Springer, Heidelberg (2016). doi:10.1007/978-3-662-53644-5_13
Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). doi:10.1007/978-3-642-19379-8_4
Ramanna, S.C.: More efficient constructions for inner-product encryption. In: Manulis, M., Sadeghi, A.R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 231–248. Springer, Cham (2016). doi:10.1007/978-3-319-39555-5_13
Attrapadung, N., Hanaoka, G., Matsumoto, T., Teruya, T., Yamada, S.: Attribute based encryption with direct efficiency tradeoff. In: Manulis, M., Sadeghi, A.R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 249–266. Springer, Cham (2016). doi:10.1007/978-3-319-39555-5_14
Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Trans. Inf. Theory 29(2), 208–210 (1983)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Ibraimi, L., Tang, Q., Hartel, P., Jonker, W.: Efficient and provable secure ciphertext-policy attribute-based encryption schemes. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 1–12. Springer, Heidelberg (2009). doi:10.1007/978-3-642-00843-6_1
Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568–588. Springer, Heidelberg (2011). doi:10.1007/978-3-642-20465-4_31
Fu, Z., Ren, K., Jiangang, S., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. In: IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 9, pp. 2546–2559 (2016)
Acknowledgments
The authors would like to thank anonymous reviewers for their suggestions. Besides, this work was supported by the National Natural Science Foundation of China under Grant Nos. 61303191, 61402504 and 61402508.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Cheng, Y., Zhou, H., Ma, J., Wang, Z. (2017). Efficient CP-ABE with Non-monotonic Access Structures. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_26
Download citation
DOI: https://doi.org/10.1007/978-3-319-68542-7_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68541-0
Online ISBN: 978-3-319-68542-7
eBook Packages: Computer ScienceComputer Science (R0)