Abstract
We construct a new protocol for attribute-based encryption with the use of the modification of the standard secret sharing scheme. In the suggested modification of the secret sharing scheme, only one master key for each user is required that is achieved by linearly enlarging public parameters in access formula. We then use this scheme for designing an attribute-based encryption protocol related to some access structure in terms of attributes. We demonstrate that the universe of possible attributes does not affect the resulting efficiency of the scheme. The security proofs for both constructions are provided.
Similar content being viewed by others
References
Goyal, V., Pandey, O., Sahai, A., Waters B.R.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 89–98 (2006)
Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. In: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pp. 213–229 (2001)
Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Advances in Cryptology—CRYPTO, Lecture Notes in Computer Science, vol. 3621, pp. 258–275 (2005)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology EUROCRYPT, vol. 2005, pp. 457–473 (2005)
Abdalla, M., Catalano, D., Dent, A.W., Malone-Lee, J., Neven, G., Smart, N.P.: Identity-based encryption gone wild. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP (2). Lecture Notes in Computer Science, vol. 4052, pp. 300–311. Springer, Berlin, Heidelberg (2006)
Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. In: Goldwasser, S. (ed.) Advances in Cryptology CRYPTO 88. Lecture Notes in Computer Science, vol. 403, pp. 27–35. Springer, New York, NY (1990)
Boneh, D.: The decision Diffie–Hellman problem. In: Buhler, J.P. (ed.) Proceedings of the Third Algorithmic Number Theory Symposium, Lecture Notes in Computer Science, vol. 1423, pp. 48–63. Springer, Berlin (1998)
Cramer, R., Damgrd, I., Kiltz, E., Zakarias, S., Zottarel, A.: DDH-like assumptions based on extension rings. In: Public Key Cryptography-PKC 2012, Lecture Notes in Computer Science, vol. 7293, pp. 644–661 (2012)
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM Conference on Computer and Communications Security (ACM CCS), pp. 62–73 (1993)
Canetti, R., Halevi, S., Katz, J.: A forward-secure public-key encryption scheme. In: Advances in Cryptology—Eurocrypt, Lecture Notes in Computer Science, vol. 2656, pp. 255–271 (2003)
Canetti, R., Halevi, S., Katz, J.: Chosen ciphertext security from identity based encryption. In: Advances in Cryptology-Eurocrypt, Lecture Notes in Computer Science, vol. 3027, pp. 207–222 (2004)
Boneh, D., Boyen, X.: Efficient selective-ID secure identity based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) Advances in Cryptology—EUROCRYPT 2004. EUROCRYPT 2004. Lecture Notes in Computer Science, vol. 3027, pp. 223–238. Springer, Berlin (2004)
Goldreich, O.: Foundations of Cryptography: Volume 1 Basic Tools. Cambridge University Press, Cambridge (2001)
Kapadia, A., Tsang, P., Smith, S.: Attribute-Based Publishing with Hidden Credentials and Hidden Policies (2007)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This work is supported by Russian Foundation for Basic Research (18-37-20033). A.A.C. is supported by Russian Science Foundation (17-11-01377).
Rights and permissions
About this article
Cite this article
Kudinov, M.A., Chilikov, A.A., Kiktenko, E.O. et al. Advanced attribute-based encryption protocol based on the modified secret sharing scheme. J Comput Virol Hack Tech 16, 333–341 (2020). https://doi.org/10.1007/s11416-020-00366-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11416-020-00366-8