Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption
- 8 October 2013
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Computers
- Vol. 64 (1), 126-138
- https://doi.org/10.1109/tc.2013.200
Abstract
Ciphertext Policy Attribute-Based Encryption (CP-ABE) enforces expressive data access policies and each policy consists of a number of attributes. Most existing CP-ABE schemes incur a very large ciphertext size, which increases linearly with respect to the number of attributes in the access policy. Recently, Herranz proposed a construction of CP-ABE with constant ciphertext. However, Herranz do not consider the recipients' anonymity and the access policies are exposed to potential malicious attackers. On the other hand, existing privacy preserving schemes protect the anonymity but require bulky, linearly increasing ciphertext size. In this paper, we proposed a new construction of CP-ABE, named Privacy Preserving Constant CP-ABE (denoted as PP-CP-ABE) that significantly reduces the ciphertext to a constant size with any given number of attributes. Furthermore, PP-CP-ABE leverages a hidden policy construction such that the recipients' privacy is preserved efficiently. As far as we know, PP-CP-ABE is the first construction with such properties. Furthermore, we developed a Privacy Preserving Attribute-Based Broadcast Encryption (PP-AB-BE) scheme. Compared to existing Broadcast Encryption (BE) schemes, PP-AB-BE is more flexible because a broadcasted message can be encrypted by an expressive hidden access policy, either with or without explicit specifying the receivers. Moreover, PP-AB-BE significantly reduces the storage and communication overhead to the order of O(log N), where N is the system size. Also, we proved, using information theoretical approaches, PP-AB-BE attains minimal bound on storage overhead for each user to cover all possible subgroups in the communication system.Keywords
This publication has 25 references indexed in Scilit:
- Attribute-based on-demand multicast group setup with membership anonymityComputer Networks, 2009
- Bounded Ciphertext Policy Attribute Based EncryptionLecture Notes in Computer Science, 2008
- Attribute-Based Broadcast Encryption Scheme Made EfficientPublished by Springer Science and Business Media LLC ,2008
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner ProductsPublished by Springer Science and Business Media LLC ,2008
- A lower bound for multicast key distributionComputer Networks, 2004
- Key establishment in large dynamic groups using one-way function treesIEEE Transactions on Software Engineering, 2003
- An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemesIEEE Transactions on Information Theory, 2001
- Secure group communications using key graphsIEEE/ACM Transactions on Networking, 2000
- Bounds on the average number of products in the minimum sum-of-products expressions for multiple-value input two-valued output functionsIEEE Transactions on Computers, 1991
- Minimization of Boolean Functions*Bell System Technical Journal, 1956