Abstract
In this paper, we present the first ciphertext-policy attribute-based encryption (CP-ABE) scheme for polynomial-size general circuits based on bilinear maps which is more suitable for practical use and more efficient than multilinear maps. Our scheme uses a top-down secret sharing and FANOUT gate to resist the “backtracking attack” which is the main barrier expending access tree to general circuit. In the standard model, selective security of our scheme is proved. Comparing with current scheme for general circuits from bilinear maps, our work is more efficient.
Similar content being viewed by others
References
Sahai A, Waters B. Fuzzy identity-based encryption[C]// Advances in Cryptology—EUROCRYPT 2005, LNCS 3494. Berlin, Heidelberg: Springer-Verlag, 2005: 457–473.
Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data [C] // ACM Conference on Computer and Communications Security, CCS 2006. New York: ACM Press, 2006: 89–98.
Ostrovsky R, Sahai A, Waters B. Attribute-based encryption with non-monotonic access structures[C] // ACM Conference on Computer and Communications Security, CCS 2007. New York: ACM Press, 2007: 195–203.
Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[C] // IEEE Symposium on Security and Privacy. Washington D C: IEEE Computer Society, 2007: 321–334.
Waters B. Ciphertext-Policy attribute-based encryption: An expressive, efficient, and provably secure realization[C]// Public Key Cryptography 2011, LNCS 6571. Berlin: Springer-Verlag, 2011: 53–70.
Lewko A, Waters B. Decentralizing attribute-based encryption [C] // Advances in Cryptology—EUROCRYPT 2011, LNCS 6632. Berlin: Springer-Verlag, 2011: 568–588.
Luan I, Tang Q, Hartel P, et al. Efficient and provable secure ciphertext-policy attribute-based encryption schemes[C]// Information Security Practice and Experience, International Conference. Berlin, Heidelberg: Springer-Verlag, 2009: 1–12.
Xu R, Wang Y, Lang B. A tree-based CP-ABE scheme with hidden policy supporting secure data sharing in cloud computting [C] // International Conference on Advanced Cloud and Big Data. New York: ACM Press, 2013: 51–57.
He H, Li R, Dong X, et al. Secure, efficient and fine-grained data access control mechanism for P2P storage cloud[J]. IEEE Transactions on Cloud Computing, 2014, 2(4): 471–484.
Waters B. Functional encryption: Origins and recent developments [C] // Public Key Cryptography 2013, LNCS 7778. Berlin: Springer-Verlag, 2013: 51–54.
Garg S, Gentry C, Halevi S, et al. Attribute-based encryption for circuits from multilinear maps [C] // Advances in Cryptology— CRYPTO 2013, LNCS 8043. Berlin: Springer-Verlag, 2013: 479–499.
Dragan C C, Tiplea F L. Key-Policy attribute-based encryption for general Boolean circuits from secret sharing and multi-linear maps [C] // Cryptography and Information Security LNCS 9540. Berlin, Heidelberg: Springer-Verlag, 2016: 112–133.
Dan B, Gentry C, Gorbunov S, et al. Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits [C] //Advances in Cryptology— EUROCRYPT 2014, LNCS 8441. Berlin, Heidelberg: Springer-Verlag, 2014: 533–556.
Datta P, Dutta R, Mukhopadhyay S. Compact attribute-based encryption and signcryption for general circuits from multilinear maps [C] // Advances in Cryptology — INDOCRYPT 2015, LNCS 9462. Heidelberg: Springer-Verlag, 2015: 3–24.
Xu J, Wen Q, Li W, et al. Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation in cloud computing [J]. IEEE Transactions on Parallel & Distributed Systems, 2016, 27(1):119–129.
Tiplea F L, Dragan C C. Key-Policy attribute-based encryption for boolean circuits from bilinear maps [C] // Cryptography and Information Security. Berlin, Heidelberg: Springer-Verlag, 2014: 175–193.
Garg S, Gentry C, Shai I, et al. Candidate multilinear maps from ideal lattices [C] // Advances in Cryptology—EUROCRYPT 2013, LNCS 7881. Berlin, Heidelberg: Springer-Verlag, 2013: 1–17.
Hu Y, Jia H. Cryptanalysis of GGH map [C] // Advances in Cryptology— EUROCRYPT 2016, LNCS 9665. Berlin, Heidelberg: Springer-Verlag, 2016: 537–565.
Stinson D R. Cryptography: Theory and Practice [M]. 3rd edition. Chapman and Hall: CRC Press, 2005.
Beimel A. Secure Schemes for secret sharing and key distribution [J]. International Journal of Pure & Applied Mathematics, 1996, (1): 27–31.
Bellare M, Hoang V T, Rogaway P. Foundations of garbled circuits [C] // ACM Conference on Computer and Communications Security. New York: ACM Press, 2013: 784–796.
Boneh D, Franklin M K. Identity-Based encryption from the Weil pairing [C] // International Cryptology Conference on Advances in Cryptology. Berlin, Heidelberg: Springer-Verlag, 2001: 213–229.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (61272488), Science and Technology on Information Assurance Laboratory (KJ-15-006) and Fundamental and Frontier Technology Research of Henan Province (162300410192)
Biography: HU Peng, male, Master candidate, research direction: cryptography and information security.
Rights and permissions
About this article
Cite this article
Hu, P., Gao, H. Ciphertext-policy attribute-based encryption for general circuits from bilinear maps. Wuhan Univ. J. Nat. Sci. 22, 171–177 (2017). https://doi.org/10.1007/s11859-017-1231-8
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-017-1231-8