Soft Computing

, Volume 21, Issue 20, pp 6191–6200 | Cite as

Adaptable key-policy attribute-based encryption with time interval

  • Siqi MaEmail author
  • Junzuo Lai
  • Robert H. Deng
  • Xuhua Ding
Methodologies and Application


In this paper, we introduce a new cryptographic primitive: adaptable KP-ABE with time interval (KP-TIABE), which is an extension of key-policy attribute-based encryption (KP-ABE). Adaptable KP-TIABE specifies a decryption time interval for every ciphertext such that the ciphertext can only be decrypted within this time interval. To be more flexible, the decryption time interval associated with a ciphertext can be adjusted on demand by a semi-trusted server. We propose a formal model for adaptable KP-TIABE, present a concrete adaptable KP-TIABE scheme and prove its security under the security model.


Adaptable key-policy attribute-based encryption Time specific Adaptability 


Compliance with ethical standards

Conflict of interest

The authors declare that there is no conflict of interest.


  1. Beimel A (1996) Secure schemes for secret sharing and key distribution. PhD thesis, PhD thesis, Israel Institute of Technology, Technion, Haifa, IsraelGoogle Scholar
  2. Blake IF, Chan ACF (2004) Scalable, server-passive, user-anonymous timed release public key encryption from bilinear pairing. In: IACR cryptology ePrint archive, 2004, p 211Google Scholar
  3. Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Advances in cryptology—EUROCRYPT’98. Springer, pp 127–144Google Scholar
  4. Boneh D, Boyen X, Goh E-J (2005) Hierarchical identity based encryption with constant size ciphertext. In: Advances in cryptology—EUROCRYPT 2005. Springer, pp 440–456Google Scholar
  5. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 89–98Google Scholar
  6. Jakobsson M (1999) On quorum controlled asymmetric proxy re-encryption. In: Public key cryptography, vol 1560. Springer, pp 112–121Google Scholar
  7. Kasamatsu K, Matsuda T, Emura K, Attrapadung N, Hanaoka G, Imai H (2012) Time-specific encryption from forward-secure encryption. In: Security and cryptography for networks, vol 7485. Springer, Heidelberg, pp 184–204Google Scholar
  8. Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354CrossRefGoogle Scholar
  9. Lai J, Deng RH, Yang Y, Weng J (2014) Adaptable ciphertext-policy attribute-based encryption. In: Pairing-based cryptography—pairing 2013. Springer, pp 199–214Google Scholar
  10. May T (1993) Time-release crypto, Manuscript.
  11. Mora Afonso V, Carballero-Gil P (2014) Using identity-based cryptography in mobile applications. In: International joint conference SOCO’13-CISIS’13-ICEUTE’13, 239. Springer, pp 527–536Google Scholar
  12. Muñoz AM, Rodríguez AF, Encinas LH, Alcázar BA (2013) A toolbox for dpa attacks to smart cards. In: International joint conference SOCO. Springer, pp 399–408Google Scholar
  13. Paterson KG, Quaglia EA (2010) Time-specific encryption. In: Garay JA, De Prisco R (eds) Security and cryptography for networks. Springer, Berlin, pp 1–16Google Scholar
  14. Rivest RL, Shamir A, Wagner DA (1996) Time-lock puzzles and timed-release crypto. Technical report, MIT, MAGoogle Scholar
  15. Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Advances in cryptology—EUROCRYPT 2005. Springer, pp 457–473Google Scholar
  16. Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Public key cryptography—international conference on practice and theory of public-key cryptography 2011. Springer, pp 53–70Google Scholar
  17. Weng J, Deng RH, Ding X, Chu CK, Lai J (2009) Conditional proxy re-encryption secure against chosen-ciphertext attack. In: Proceedings of the 4th international symposium on information, computer, and communications security. ACM, pp 322–332Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2016

Authors and Affiliations

  • Siqi Ma
    • 1
    Email author
  • Junzuo Lai
    • 2
  • Robert H. Deng
    • 1
  • Xuhua Ding
    • 1
  1. 1.Singapore Management UniversitySingaporeSingapore
  2. 2.Jinan UniversityGuangzhouChina

Personalised recommendations