Advertisement

Key-Policy Attribute-Based Encryption from Bilinear Maps

  • Ferucio Laurenţiu Ţiplea
  • Constantin Cătălin Drăgan
  • Anca-Maria Nica
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10543)

Abstract

The aim of this paper is to provide an overview on the newest results regarding the design of key-policy attribute-based encryption (KP-ABE) schemes from secret sharing and bilinear maps.

References

  1. 1.
    Bellare, M., Hoang, V.T., Rogaway, P.: Foundations of garbled circuits. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 784–796. ACM, New York (2012)Google Scholar
  2. 2.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, S&P 2007, pp. 321–334. IEEE Computer Society (2007)Google Scholar
  3. 3.
    Ţiplea, F.L., Drăgan, C.C.: Key-policy attribute-based encryption for boolean circuits from bilinear maps. In: Ors, B., Preneel, B. (eds.) BalkanCryptSec 2014. LNCS, vol. 9024, pp. 175–193. Springer, Cham (2015). doi: 10.1007/978-3-319-21356-9_12 CrossRefGoogle Scholar
  4. 4.
    Drăgan, C.C., Ţiplea, F.L.: Key-policy attribute-based encryption for general boolean circuits from secret sharing and multi-linear maps. In: Pasalic, E., Knudsen, L.R. (eds.) BalkanCryptSec 2015. LNCS, vol. 9540, pp. 112–133. Springer, Cham (2016). doi: 10.1007/978-3-319-29172-7_8 CrossRefGoogle Scholar
  5. 5.
    Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 1–17. Springer, Heidelberg (2013). doi: 10.1007/978-3-642-38348-9_1 CrossRefGoogle Scholar
  6. 6.
    Garg, S., Gentry, C., Halevi, S., Sahai, A., Waters, B.: Attribute-based encryption for circuits from multilinear maps. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8043, pp. 479–499. Springer, Heidelberg (2013). doi: 10.1007/978-3-642-40084-1_27 CrossRefGoogle Scholar
  7. 7.
    Gorbunov, S., Vaikuntanathan, V., Wee, H.: Attribute-based encryption for circuits. In: Boneh, D., Roughgarden, T., Feigenbaum, J. (eds.) STOC, pp. 545–554. ACM (2013)Google Scholar
  8. 8.
    Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encypted data. In: ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)Google Scholar
  9. 9.
    Peng, H., Gao, H.: A key-policy attribute-based encryption scheme for general circuit from bilinear maps. Int. J. Network Secur. 19(5), 704–710 (2017)Google Scholar
  10. 10.
    Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: ACM Conference on Computer and Communications Security, pp. 195–203. ACM (2007)Google Scholar
  11. 11.
    Simmons, G.J.: How to (Really) share a secret. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 390–448. Springer, New York (1990). doi: 10.1007/0-387-34799-2_30 Google Scholar
  12. 12.
    Stinson, D.R.: Cryptography: Theory and Practice, 3rd edn. Chapman and Hall/CRC, Boca Raton (2005)MATHGoogle Scholar
  13. 13.
    Tassa, T.: Hierarchical threshold secret sharing. J. Cryptology 20(2), 237–264 (2007)CrossRefMATHMathSciNetGoogle Scholar
  14. 14.
    Tassa, T., Dyn, N.: Multipartite secret sharing by bivariate interpolation. J. Cryptology 22(2), 227–258 (2008)CrossRefMATHMathSciNetGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Ferucio Laurenţiu Ţiplea
    • 1
  • Constantin Cătălin Drăgan
    • 2
  • Anca-Maria Nica
    • 1
  1. 1.Department of Computer Science“Alexandru Ioan Cuza” University of IaşiIaşiRomania
  2. 2.CNRS, LORIAVandoeuvre-lès-Nancy CedexFrance

Personalised recommendations