Skip to main content
Log in

Ciphertext-policy attribute-based encryption for general circuits from bilinear maps

  • Cryptology
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

In this paper, we present the first ciphertext-policy attribute-based encryption (CP-ABE) scheme for polynomial-size general circuits based on bilinear maps which is more suitable for practical use and more efficient than multilinear maps. Our scheme uses a top-down secret sharing and FANOUT gate to resist the “backtracking attack” which is the main barrier expending access tree to general circuit. In the standard model, selective security of our scheme is proved. Comparing with current scheme for general circuits from bilinear maps, our work is more efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Sahai A, Waters B. Fuzzy identity-based encryption[C]// Advances in Cryptology—EUROCRYPT 2005, LNCS 3494. Berlin, Heidelberg: Springer-Verlag, 2005: 457–473.

    Chapter  Google Scholar 

  2. Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data [C] // ACM Conference on Computer and Communications Security, CCS 2006. New York: ACM Press, 2006: 89–98.

    Google Scholar 

  3. Ostrovsky R, Sahai A, Waters B. Attribute-based encryption with non-monotonic access structures[C] // ACM Conference on Computer and Communications Security, CCS 2007. New York: ACM Press, 2007: 195–203.

    Google Scholar 

  4. Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[C] // IEEE Symposium on Security and Privacy. Washington D C: IEEE Computer Society, 2007: 321–334.

    Google Scholar 

  5. Waters B. Ciphertext-Policy attribute-based encryption: An expressive, efficient, and provably secure realization[C]// Public Key Cryptography 2011, LNCS 6571. Berlin: Springer-Verlag, 2011: 53–70.

    Chapter  Google Scholar 

  6. Lewko A, Waters B. Decentralizing attribute-based encryption [C] // Advances in Cryptology—EUROCRYPT 2011, LNCS 6632. Berlin: Springer-Verlag, 2011: 568–588.

    Google Scholar 

  7. Luan I, Tang Q, Hartel P, et al. Efficient and provable secure ciphertext-policy attribute-based encryption schemes[C]// Information Security Practice and Experience, International Conference. Berlin, Heidelberg: Springer-Verlag, 2009: 1–12.

    Google Scholar 

  8. Xu R, Wang Y, Lang B. A tree-based CP-ABE scheme with hidden policy supporting secure data sharing in cloud computting [C] // International Conference on Advanced Cloud and Big Data. New York: ACM Press, 2013: 51–57.

    Google Scholar 

  9. He H, Li R, Dong X, et al. Secure, efficient and fine-grained data access control mechanism for P2P storage cloud[J]. IEEE Transactions on Cloud Computing, 2014, 2(4): 471–484.

    Article  Google Scholar 

  10. Waters B. Functional encryption: Origins and recent developments [C] // Public Key Cryptography 2013, LNCS 7778. Berlin: Springer-Verlag, 2013: 51–54.

    Chapter  Google Scholar 

  11. Garg S, Gentry C, Halevi S, et al. Attribute-based encryption for circuits from multilinear maps [C] // Advances in Cryptology— CRYPTO 2013, LNCS 8043. Berlin: Springer-Verlag, 2013: 479–499.

    Google Scholar 

  12. Dragan C C, Tiplea F L. Key-Policy attribute-based encryption for general Boolean circuits from secret sharing and multi-linear maps [C] // Cryptography and Information Security LNCS 9540. Berlin, Heidelberg: Springer-Verlag, 2016: 112–133.

    Google Scholar 

  13. Dan B, Gentry C, Gorbunov S, et al. Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits [C] //Advances in Cryptology— EUROCRYPT 2014, LNCS 8441. Berlin, Heidelberg: Springer-Verlag, 2014: 533–556.

    Google Scholar 

  14. Datta P, Dutta R, Mukhopadhyay S. Compact attribute-based encryption and signcryption for general circuits from multilinear maps [C] // Advances in Cryptology — INDOCRYPT 2015, LNCS 9462. Heidelberg: Springer-Verlag, 2015: 3–24.

    Google Scholar 

  15. Xu J, Wen Q, Li W, et al. Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation in cloud computing [J]. IEEE Transactions on Parallel & Distributed Systems, 2016, 27(1):119–129.

    Article  Google Scholar 

  16. Tiplea F L, Dragan C C. Key-Policy attribute-based encryption for boolean circuits from bilinear maps [C] // Cryptography and Information Security. Berlin, Heidelberg: Springer-Verlag, 2014: 175–193.

    Google Scholar 

  17. Garg S, Gentry C, Shai I, et al. Candidate multilinear maps from ideal lattices [C] // Advances in Cryptology—EUROCRYPT 2013, LNCS 7881. Berlin, Heidelberg: Springer-Verlag, 2013: 1–17.

    Google Scholar 

  18. Hu Y, Jia H. Cryptanalysis of GGH map [C] // Advances in Cryptology— EUROCRYPT 2016, LNCS 9665. Berlin, Heidelberg: Springer-Verlag, 2016: 537–565.

    Chapter  Google Scholar 

  19. Stinson D R. Cryptography: Theory and Practice [M]. 3rd edition. Chapman and Hall: CRC Press, 2005.

    Google Scholar 

  20. Beimel A. Secure Schemes for secret sharing and key distribution [J]. International Journal of Pure & Applied Mathematics, 1996, (1): 27–31.

    Google Scholar 

  21. Bellare M, Hoang V T, Rogaway P. Foundations of garbled circuits [C] // ACM Conference on Computer and Communications Security. New York: ACM Press, 2013: 784–796.

    Google Scholar 

  22. Boneh D, Franklin M K. Identity-Based encryption from the Weil pairing [C] // International Cryptology Conference on Advances in Cryptology. Berlin, Heidelberg: Springer-Verlag, 2001: 213–229.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haiying Gao.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (61272488), Science and Technology on Information Assurance Laboratory (KJ-15-006) and Fundamental and Frontier Technology Research of Henan Province (162300410192)

Biography: HU Peng, male, Master candidate, research direction: cryptography and information security.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hu, P., Gao, H. Ciphertext-policy attribute-based encryption for general circuits from bilinear maps. Wuhan Univ. J. Nat. Sci. 22, 171–177 (2017). https://doi.org/10.1007/s11859-017-1231-8

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-017-1231-8

Key words

CLC number

Navigation