Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2013, Article ID 810969, 7 pages
http://dx.doi.org/10.1155/2013/810969
Research Article

An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length

Changji Wang1,2,3 and Jianfa Luo1,2

1School of Information Science and Technology, Sun Yat-Sen University, Guangzhou 510006, China
2Guangdong Province Information Security Key Laboratory, Guangzhou 510006, China
3Research Center of Software Technology for Information Service, South China Normal University, Guangzhou 501631, China

Received 21 January 2013; Accepted 16 March 2013

Academic Editor: Hai-lin Liu

Copyright © 2013 Changji Wang and Jianfa Luo. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P. Mell and T. Grance, “The NIST denition of cloud computing,” Special Publication 800-145, 2011. View at Google Scholar
  2. S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in Proceedings of the 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS '10), pp. 261–270, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. A. Sahai and B. Waters, “Fuzzy identity based encryption,” in Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques (EUROCRYPT '05), vol. 3494 of Lecture Notes in Computer Science, pp. 457–473, Springer, 2005.
  4. D. Boneh and M. K. Franklin, “Identity-based encryption from the Weil pairing,” in Proceedings of the Annual International Cryptology Conference (CRYPTO '01), vol. 2139 of Lecture Notes in Computer Science, pp. 213–229, Springer, 2001.
  5. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06), pp. 89–98, November 2006. View at Publisher · View at Google Scholar · View at Scopus
  6. R. Ostrovsky, A. Sahai, and B. Waters, “Attribute-based encryption with non-monotonic access structures,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 195–203, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  7. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proceedings of IEEE Symposium on Security and Privacy (SP '07), pp. 321–334, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  8. L. Cheung and C. Newport, “Provably secure ciphertext policy ABE,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 456–465, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. V. Goyal, A. Jain, O. Pandey, and A. Sahai, “Bounded ciphertext policy attribute based encryption,” in Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II (ICALP '08), vol. 5125 of Lecture Notes in Computer Science, pp. 579–591, Springer, 2008.
  10. B. Waters, “Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization,” in Proceedings of the International Conference on Practice and Theory in Public Key Cryptography (PKC '11), vol. 6571 of Lecture Notes in Computer Science, pp. 53–70, Springer, 2011.
  11. M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, “Secure attribute-based systems,” Journal of Computer Security, vol. 18, no. 5, pp. 799–837, 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. M. Li, S. C. Yu, Y. Zheng, K. Ren, and W. J. Lou, “Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 131–143, 2013. View at Publisher · View at Google Scholar
  13. K. Emura, A. Miyaji, A. Nomura, K. Omote, and M. Soshi, “A ciphertext-policy, attribute-based encryption scheme with constant ciphertext length,” in Proceedings of the International Conference (ISPEC '09), vol. 5451 of Lecture Notes in Computer Science, pp. 13–23, Springer, 2009.
  14. J. Herranz, F. Laguillaumie, and C. Rafols, “Constant size ciphertexts in thresh-old attribute-based encryption,” in Proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography (PKC '10), vol. 6056 of Lecture Notes in Computer Science, pp. 19–34, Springer, 2010.
  15. N. Attrapadung, J. Herranz, F. Laguillaumie, B. Libert, E. de Panafieu, and C. Ràfols, “Attribute-based encryption schemes with constant-size ciphertexts,” Theoretical Computer Science, vol. 422, pp. 15–38, 2012. View at Publisher · View at Google Scholar · View at MathSciNet
  16. C. Delerablee, “Identity-based broadcast encryption with constant size ciphertexts and private keys,” in Proceedings of the Advances in Crypotology 13th International Conference on Theory and Application of Cryptology and Information Security (ASCIACRYPT '07), vol. 4833 of Lecture Notes in Computer Science, pp. 200–217, Springer, 2007.
  17. A. Lewko and B. Waters, “Decentralizing attribute-based encryption,” in Proceedings of the 30th Annual International Conference on Theory and Applications of Cryptographic Techniques: Advances in Cryptology (EUROCRYPT '11), vol. 6632 of Lecture Notes in Computer Science, pp. 568–588, Springer, 2011.