Abstract
According to the relation of an attribute set and its subset, the author presents a hierarchical attribute-based encryption scheme in which a secret key is associated with an attribute set. A user can delegate the private key corresponding to any subset of an attribute set while he has the private key corresponding to the attribute set. Moreover, the size of the ciphertext is constant, but the size of private key is linear with the order of the attribute set in the hierarchical attribute-based encryption scheme. Lastly, we can also prove that this encryption scheme meets the security of IND-sSET-CPA in the standard model.
Similar content being viewed by others
References
Shamir A. Identity-based cryptosystems and signature schemes [C]//Advances in Cryptology. New York: Springer-Verlag, 1985: 47–53.
Sahai A, Waters B. Fuzzy identity-based encryption [C]// Advances in Cryptology Eurocrypt 2005. New York: Springer-Verlag, 2005: 557–557.
Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data [C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM Press, 2006: 89–98.
Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption [C]// 2007 IEEE Security and Privacy. Washington D C: IEEE Press, 2007: 321–334.
Cheung L, Newport C. Provably secure ciphertext policy ABE [C]//Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM Press, 2008: 456–465.
Goyal V, Jain A, Pandey O, et al. Bounded ciphertext policy attribute based encryption [J]. Automata, Languages and Programming. New York: Springer-Verlag, 2008: 579–591.
Waters B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization [C]// Public Key Cryptography PKC 2011. New York: Springer-Verlag, 2011: 53–70.
Boneh D, Franklin M. Identity-based encryption from the Weil pairing [C]//Advances in Cryptology-CRYPTO 2001. New York: Springer-Verlag, 2001: 213–229.
Canetti R, Halevi S, Katz J. A forward-secure public-key encryption scheme [C]//Advances in Cryptology Eurocrypt 2003. New York: Springer-Verlag, 2003: 646–646.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (60903175, 60703048) and the Natural Science Foundation of Hubei Province (2009CBD307, 2008CDB352)
Biography: ZOU Xiubin, male, Lecturer, Ph.D., research direction: public key cryptosystem and its security analysis.
Rights and permissions
About this article
Cite this article
Zou, X. A hierarchical attribute-based encryption scheme. Wuhan Univ. J. Nat. Sci. 18, 259–264 (2013). https://doi.org/10.1007/s11859-013-0925-9
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-013-0925-9
Key words
- attribute-based encryption
- hierarchical attribute-based encryption
- identity-based encryption (IBE)
- bilinear map