4.7 Article

Security-level switchable attribute-based encryption under the strictly weaker assumption family

期刊

INFORMATION SCIENCES
卷 482, 期 -, 页码 47-62

出版社

ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2018.12.062

关键词

KP-ABE; CP-ABE; k-BDH assumption family; Selective security model; PKFA

资金

  1. National Key R and D Program of China [2017YFB0802000]
  2. National Natural Science Foundation of China [61772147, 61300204, 61702197]
  3. Humanities and social science research project of Ministry of Education [15YJCZH029]
  4. Project of the 13th Five-year Plan for the Development of Philosophy and Social Sciences in Guangzhou [2017GZQN05]
  5. Guangdong Province Natural Science Foundation of major basic research and Cultivation project [2015A030308016]
  6. Natural Science Foundation of Guangdong Province [2017A030310261]
  7. Colleges And Universities Innovation Team Construction Project Guangdong province [2015KCXTD014]
  8. National Cryptography Development Fund [MMJJ20170117]
  9. Guangzhou City Bureau of cooperative innovation project [1201610005]
  10. Science and Technology Planning Project of Guangdong Province [2017A020208054]

向作者/读者索取更多资源

Attribute-Based Encryption (ABE), a special type of public key encryption, efficiently shares sensitive data with fine-grained access control. ABE can be classified into two types: Ciphertext-Policy ABE (CP-ABE) and Key-Policy ABE (KP-ABE). However, the securities of most presented ABE systems were reduced to the q-type DBDH (Dicisional Diffie-Hellman Assumption) assumptions, which are stronger than the DBDH assumption. So, the above mentioned ABE systems become insecure if DBDH is proved to be insecure. We propose a new ABE framework, called security-level switchable ABE (SLS-ABE). In SLS-ABE framework, a series of ABE systems can be generated and their securities are reduced to a k-BDH assumption family proposed by Benson et al. The k-BDH assumption family has the following properties: 1) any assumption in the k-BDH assumption family is associated with a parameter k, and the assumption becomes strictly weaker as the parameter k increases. 2) the 1-BDH assumption is proved to be equivalent to the DBDH assumption. So, all the k-BDH assumptions where k > 1 are weaker than DBDH assumption. We apply the technique of Benson et al. to construct ABE on k-BDH assumption, furthermore, we design a new framework to support the flexible switchable security-level for users. Concretely, the master public key, the master secret key and core keys issued by the system are constant. A User can generate different security-level public key secret key pairs if it holds the core key. We propose a public key forgery attack model (PKFA) to capture the behaviors of adversary for generating a forged public key. We formally prove the selective-CPA security and PKFA security of our ABE systems. We compare the performances of our systems with Waters' ABE systems. (C) 2019 Elsevier Inc. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据