Autosoft Journal

Online Manuscript Access


Efficient Attribute-Based Encryption Schemes for Secure Communications in Cyber Defense


Authors



Abstract

How to securely transmit data over the cyber is an important problem in cyber defense. In this paper, we propose a ciphertext-policy attribute-based encryption (CP-ABE) scheme, in which the messages are encrypted together with access policy, while secret keys are associated with specified sets of attributes, and the secret keys can correctly decrypt the ciphertexts only when the attributes satisfy the associated access policy. Our proposed CP-ABE scheme is provably secure in the full model without random oracles, and has a tight security reduction. We stress that a tight security reduction implies a higher security or the requirement of smaller keys and ciphertext sizes to obtain the same security level, and thus make the scheme more efficient. Thus our scheme can be efficiently used to encrypt the transmitted data over cyber in a fine-grained manner.


Keywords


Pages

Total Pages: 7
Pages: 397-403

DOI
10.1080/10798587.2015.1120092


Manuscript ViewPdf Subscription required to access this document

Obtain access this manuscript in one of the following ways


Already subscribed?

Need information on obtaining a subscription? Personal and institutional subscriptions are available.

Already an author? Have access via email address?


Published

Volume: 22
Issue: 3
Year: 2016

Cite this document


References

Attrapadung, Nuttapong. "Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More." Lecture Notes in Computer Science (2014): 557-577. Crossref. Web. https://doi.org/10.1007/978-3-642-55220-5_31

Beimel, A. (1996). Secure schemes for secret sharing and key distribution Doctoral dissertation. Technion-Israel Institute of technology, Faculty of computer science.

Bethencourt, John, Amit Sahai, and Brent Waters. "Ciphertext-Policy Attribute-Based Encryption." 2007 IEEE Symposium on Security and Privacy (SP ”07) (2007): n. pag. Crossref. Web. https://doi.org/10.1109/SP.2007.11

Boneh, Dan, and Matt Franklin. "Identity-Based Encryption from the Weil Pairing." Lecture Notes in Computer Science (2001): 213-229. Crossref. Web. https://doi.org/10.1007/3-540-44647-8_13

Boneh, Dan, Xavier Boyen, and Eu-Jin Goh. "Hierarchical Identity Based Encryption with Constant Size Ciphertext." Advances in Cryptology - EUROCRYPT 2005 (2005): 440-456. Crossref. Web. https://doi.org/10.1007/11426639_26

Boneh, Dan, Craig Gentry, and Brent Waters. "Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys." Lecture Notes in Computer Science (2005): 258-275. Crossref. Web. https://doi.org/10.1007/11535218_16

Chase, Melissa. "Multi-Authority Attribute Based Encryption." Lecture Notes in Computer Science 515-534. Crossref. Web. https://doi.org/10.1007/978-3-540-70936-7_28

Chase, Melissa, and Sherman S.M. Chow. "Improving Privacy and Security in Multi-Authority Attribute-Based Encryption." Proceedings of the 16th ACM conference on Computer and communications security - CCS ”09 (2009): n. pag. Crossref. Web. https://doi.org/10.1145/1653662.1653678

Cheung, Ling, and Calvin Newport. "Provably Secure Ciphertext Policy ABE." Proceedings of the 14th ACM conference on Computer and communications security - CCS ”07 (2007): n. pag. Crossref. Web. https://doi.org/10.1145/1315245.1315302

Freeman, David Mandell. "Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups." Lecture Notes in Computer Science (2010): 44-61. Crossref. Web. https://doi.org/10.1007/978-3-642-13190-5_3

Gentry, Craig. "Practical Identity-Based Encryption Without Random Oracles." Lecture Notes in Computer Science (2006): 445-464. Crossref. Web. https://doi.org/10.1007/11761679_27

Goyal, Vipul et al. "Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data." Proceedings of the 13th ACM conference on Computer and communications security - CCS ”06 (2006): n. pag. Crossref. Web. https://doi.org/10.1145/1180405.1180418

Hohenberger, Susan, and Brent Waters. "Attribute-Based Encryption with Fast Decryption." Lecture Notes in Computer Science (2013): 162-179. Crossref. Web. https://doi.org/10.1007/978-3-642-36362-7_11

Hohenberger, Susan, and Brent Waters. "Online/Offline Attribute-Based Encryption." Lecture Notes in Computer Science (2014): 293-310. Crossref. Web. https://doi.org/10.1007/978-3-642-54631-0_17

Junzuo Lai et al. "Attribute-Based Encryption With Verifiable Outsourced Decryption." IEEE Transactions on Information Forensics and Security 8.8 (2013): 1343-1354. Crossref. Web. https://doi.org/10.1109/TIFS.2013.2271848

Lewko, Allison, and Brent Waters. "Decentralizing Attribute-Based Encryption." Lecture Notes in Computer Science (2011): 568-588. Crossref. Web. https://doi.org/10.1007/978-3-642-20465-4_31

Lewko, Allison et al. "Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption." Lecture Notes in Computer Science (2010): 62-91. Crossref. Web. https://doi.org/10.1007/978-3-642-13190-5_4

Li, Qi et al. "Fully Secure Decentralized Key-Policy Attribute-Based Encryption." 2013 5th International Conference on Intelligent Networking and Collaborative Systems (2013): n. pag. Crossref. Web. https://doi.org/10.1109/INCoS.2013.39

Sahai, A. "Non-Malleable Non-Interactive Zero Knowledge and Adaptive Chosen-Ciphertext Security." 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039) n. pag. Crossref. Web. https://doi.org/10.1109/SFFCS.1999.814628

Sahai, Amit, and Brent Waters. "Fuzzy Identity-Based Encryption." Advances in Cryptology - EUROCRYPT 2005 (2005): 457-473. Crossref. Web. https://doi.org/10.1007/11426639_27

Waters, Brent. "Dual System Encryption: Realizing Fully Secure IBE and HIBE Under Simple Assumptions." Lecture Notes in Computer Science (2009): 619-636. Crossref. Web. https://doi.org/10.1007/978-3-642-03356-8_36

Waters, Brent. "Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization." Lecture Notes in Computer Science (2011): 53-70. Crossref. Web. https://doi.org/10.1007/978-3-642-19379-8_4

JOURNAL INFORMATION


ISSN PRINT: 1079-8587
ISSN ONLINE: 2326-005X
DOI PREFIX: 10.31209
10.1080/10798587 with T&F
IMPACT FACTOR: 0.652 (2017/2018)
Journal: 1995-Present




CONTACT INFORMATION


TSI Press
18015 Bullis Hill
San Antonio, TX 78258 USA
PH: 210 479 1022
FAX: 210 479 1048
EMAIL: tsiepress@gmail.com
WEB: http://www.wacong.org/tsi/