Skip to main content

Efficient CP-ABE with Non-monotonic Access Structures

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10603))

Included in the following conference series:

Abstract

Ciphertext policy attribute based encryption (CP-ABE) systems are suitable for supporting access control with complex attribute-based policies. But there is a few CP-ABE systems that support non-monotonic access structures. In this paper we present an efficient CP-ABE construction which supports \(\mathbf {NOT}\) operation as well as m-of-n threshold gates. This construction is proved to be selectively secure under decisional bilinear Diffie-Hellman assumption. The comparison between our scheme and other similar systems shows that our construction is an efficient and expressive CP-ABE construction that supports the negation of attributes.

Y. Cheng is an engineer at National University of Defense Technology, Changsha, P. R. China. His current research interests include the storage security in public cloud services, trusted computing in public cloud or other un-trusted devices, cryptographic algorithm design for data security, data leakage prevention, etc.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nag, A., Choudhary, S., Dawn, S., Basu, S.: Secure data outsourcing in the cloud using multi-secret sharing scheme. In: Mandal, J., Satapathy, S., Sanyal, M., Bhateja, V. (eds.) AISC, vol. 458, pp. 337–343. Springer, Singapore (2017). doi:10.1007/978-981-10-2035-3_34

    Google Scholar 

  2. Athira, R., Tina, S., Arun, R., Suvanam, S.: A survey on attribute based encryption schemes for data sharing. In: Proceedings of the 2016 International Conference on Emerging Trends in Engineering and Management, pp. 19–23 (2016)

    Google Scholar 

  3. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). doi:10.1007/11426639_27

    Chapter  Google Scholar 

  4. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)

    Google Scholar 

  5. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp. 321–334. IEEE (2007)

    Google Scholar 

  6. Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 195–203. ACM (2007)

    Google Scholar 

  7. Naor, M., Pinkas, B.: Efficient trace and revoke schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 1–20. Springer, Heidelberg (2001). doi:10.1007/3-540-45472-1_1

    Chapter  Google Scholar 

  8. Beimel, A.: Secure schemes for secret sharing and key distribution. Phd thesis, Israel Institute of Technology, Technion, Haifa, Israel (1996)

    Google Scholar 

  9. Lewko, A., Sahai, A., Waters, B.: Revocation systems with very small private keys. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, pp. 273–285. IEEE (2010)

    Google Scholar 

  10. Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 456–465. ACM (2007)

    Google Scholar 

  11. Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258–275. Springer, Heidelberg (2005). doi:10.1007/11535218_16

    Chapter  Google Scholar 

  12. Vaikuntanathan, V., Voulgaris, P.: Attribute based encryption using lattices. U.S. Patent 9,281,944 (2016)

    Google Scholar 

  13. Brakerski, Z., Cash, D., Tsabary, R., Wee, H.: Targeted homomorphic attribute-based encryption. In: Hirt, M., Smith, A. (eds.) TCC 2016. LNCS, vol. 9986, pp. 330–360. Springer, Heidelberg (2016). doi:10.1007/978-3-662-53644-5_13

    Chapter  Google Scholar 

  14. Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). doi:10.1007/978-3-642-19379-8_4

    Chapter  Google Scholar 

  15. Ramanna, S.C.: More efficient constructions for inner-product encryption. In: Manulis, M., Sadeghi, A.R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 231–248. Springer, Cham (2016). doi:10.1007/978-3-319-39555-5_13

    Google Scholar 

  16. Attrapadung, N., Hanaoka, G., Matsumoto, T., Teruya, T., Yamada, S.: Attribute based encryption with direct efficiency tradeoff. In: Manulis, M., Sadeghi, A.R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 249–266. Springer, Cham (2016). doi:10.1007/978-3-319-39555-5_14

    Google Scholar 

  17. Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Trans. Inf. Theory 29(2), 208–210 (1983)

    Article  MathSciNet  Google Scholar 

  18. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  19. Ibraimi, L., Tang, Q., Hartel, P., Jonker, W.: Efficient and provable secure ciphertext-policy attribute-based encryption schemes. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 1–12. Springer, Heidelberg (2009). doi:10.1007/978-3-642-00843-6_1

    Chapter  Google Scholar 

  20. Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568–588. Springer, Heidelberg (2011). doi:10.1007/978-3-642-20465-4_31

    Chapter  Google Scholar 

  21. Fu, Z., Ren, K., Jiangang, S., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. In: IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 9, pp. 2546–2559 (2016)

    Google Scholar 

Download references

Acknowledgments

The authors would like to thank anonymous reviewers for their suggestions. Besides, this work was supported by the National Natural Science Foundation of China under Grant Nos. 61303191, 61402504 and 61402508.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong Cheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cheng, Y., Zhou, H., Ma, J., Wang, Z. (2017). Efficient CP-ABE with Non-monotonic Access Structures. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68542-7_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68541-0

  • Online ISBN: 978-3-319-68542-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics