Skip to main content
Log in

Advanced attribute-based encryption protocol based on the modified secret sharing scheme

  • Original Paper
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

We construct a new protocol for attribute-based encryption with the use of the modification of the standard secret sharing scheme. In the suggested modification of the secret sharing scheme, only one master key for each user is required that is achieved by linearly enlarging public parameters in access formula. We then use this scheme for designing an attribute-based encryption protocol related to some access structure in terms of attributes. We demonstrate that the universe of possible attributes does not affect the resulting efficiency of the scheme. The security proofs for both constructions are provided.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Goyal, V., Pandey, O., Sahai, A., Waters B.R.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 89–98 (2006)

  2. Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. In: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pp. 213–229 (2001)

  3. Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Advances in Cryptology—CRYPTO, Lecture Notes in Computer Science, vol. 3621, pp. 258–275 (2005)

  4. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology EUROCRYPT, vol. 2005, pp. 457–473 (2005)

  5. Abdalla, M., Catalano, D., Dent, A.W., Malone-Lee, J., Neven, G., Smart, N.P.: Identity-based encryption gone wild. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP (2). Lecture Notes in Computer Science, vol. 4052, pp. 300–311. Springer, Berlin, Heidelberg (2006)

    Google Scholar 

  6. Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. In: Goldwasser, S. (ed.) Advances in Cryptology CRYPTO 88. Lecture Notes in Computer Science, vol. 403, pp. 27–35. Springer, New York, NY (1990)

    Chapter  Google Scholar 

  7. Boneh, D.: The decision Diffie–Hellman problem. In: Buhler, J.P. (ed.) Proceedings of the Third Algorithmic Number Theory Symposium, Lecture Notes in Computer Science, vol. 1423, pp. 48–63. Springer, Berlin (1998)

  8. Cramer, R., Damgrd, I., Kiltz, E., Zakarias, S., Zottarel, A.: DDH-like assumptions based on extension rings. In: Public Key Cryptography-PKC 2012, Lecture Notes in Computer Science, vol. 7293, pp. 644–661 (2012)

  9. Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM Conference on Computer and Communications Security (ACM CCS), pp. 62–73 (1993)

  10. Canetti, R., Halevi, S., Katz, J.: A forward-secure public-key encryption scheme. In: Advances in Cryptology—Eurocrypt, Lecture Notes in Computer Science, vol. 2656, pp. 255–271 (2003)

  11. Canetti, R., Halevi, S., Katz, J.: Chosen ciphertext security from identity based encryption. In: Advances in Cryptology-Eurocrypt, Lecture Notes in Computer Science, vol. 3027, pp. 207–222 (2004)

  12. Boneh, D., Boyen, X.: Efficient selective-ID secure identity based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) Advances in Cryptology—EUROCRYPT 2004. EUROCRYPT 2004. Lecture Notes in Computer Science, vol. 3027, pp. 223–238. Springer, Berlin (2004)

    Chapter  Google Scholar 

  13. Goldreich, O.: Foundations of Cryptography: Volume 1 Basic Tools. Cambridge University Press, Cambridge (2001)

    Book  Google Scholar 

  14. Kapadia, A., Tsang, P., Smith, S.: Attribute-Based Publishing with Hidden Credentials and Hidden Policies (2007)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. A. Kudinov.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This work is supported by Russian Foundation for Basic Research (18-37-20033). A.A.C. is supported by Russian Science Foundation (17-11-01377).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kudinov, M.A., Chilikov, A.A., Kiktenko, E.O. et al. Advanced attribute-based encryption protocol based on the modified secret sharing scheme. J Comput Virol Hack Tech 16, 333–341 (2020). https://doi.org/10.1007/s11416-020-00366-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-020-00366-8

Keywords

Navigation