Skip to main content
Log in

A hierarchical attribute-based encryption scheme

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

According to the relation of an attribute set and its subset, the author presents a hierarchical attribute-based encryption scheme in which a secret key is associated with an attribute set. A user can delegate the private key corresponding to any subset of an attribute set while he has the private key corresponding to the attribute set. Moreover, the size of the ciphertext is constant, but the size of private key is linear with the order of the attribute set in the hierarchical attribute-based encryption scheme. Lastly, we can also prove that this encryption scheme meets the security of IND-sSET-CPA in the standard model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Shamir A. Identity-based cryptosystems and signature schemes [C]//Advances in Cryptology. New York: Springer-Verlag, 1985: 47–53.

    Chapter  Google Scholar 

  2. Sahai A, Waters B. Fuzzy identity-based encryption [C]// Advances in Cryptology Eurocrypt 2005. New York: Springer-Verlag, 2005: 557–557.

    Google Scholar 

  3. Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data [C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM Press, 2006: 89–98.

    Google Scholar 

  4. Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption [C]// 2007 IEEE Security and Privacy. Washington D C: IEEE Press, 2007: 321–334.

    Google Scholar 

  5. Cheung L, Newport C. Provably secure ciphertext policy ABE [C]//Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM Press, 2008: 456–465.

    Google Scholar 

  6. Goyal V, Jain A, Pandey O, et al. Bounded ciphertext policy attribute based encryption [J]. Automata, Languages and Programming. New York: Springer-Verlag, 2008: 579–591.

    Chapter  Google Scholar 

  7. Waters B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization [C]// Public Key Cryptography PKC 2011. New York: Springer-Verlag, 2011: 53–70.

    Google Scholar 

  8. Boneh D, Franklin M. Identity-based encryption from the Weil pairing [C]//Advances in Cryptology-CRYPTO 2001. New York: Springer-Verlag, 2001: 213–229.

    Google Scholar 

  9. Canetti R, Halevi S, Katz J. A forward-secure public-key encryption scheme [C]//Advances in Cryptology Eurocrypt 2003. New York: Springer-Verlag, 2003: 646–646.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiubin Zou.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (60903175, 60703048) and the Natural Science Foundation of Hubei Province (2009CBD307, 2008CDB352)

Biography: ZOU Xiubin, male, Lecturer, Ph.D., research direction: public key cryptosystem and its security analysis.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zou, X. A hierarchical attribute-based encryption scheme. Wuhan Univ. J. Nat. Sci. 18, 259–264 (2013). https://doi.org/10.1007/s11859-013-0925-9

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-013-0925-9

Key words

CLC number

Navigation