Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017 (2017), Article ID 7323158, 19 pages
https://doi.org/10.1155/2017/7323158
Research Article

Shorter Decentralized Attribute-Based Encryption via Extended Dual System Groups

1State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China
2East China Normal University, Shanghai, China
3Army Aviation Institute, Beijing, China

Correspondence should be addressed to Jie Zhang

Received 10 April 2017; Revised 14 July 2017; Accepted 6 August 2017; Published 18 October 2017

Academic Editor: Zonghua Zhang

Copyright © 2017 Jie Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology—EUROCRYPT 2005, vol. 3494 of Lecture Notes in Computer Science, pp. 457–473, Springer, Berlin, Heidelberg, Germany, 2005. View at Publisher · View at Google Scholar · View at MathSciNet
  2. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06), pp. 89–98, New York, NY, USA, November 2006. View at Publisher · View at Google Scholar · View at Scopus
  3. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proceedings of the IEEE Symposium on Security and Privacy (SP '07), pp. 321–334, Oakland, Calif, USA, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  4. A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, “Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption,” in Advances in Cryptology—EUROCRYPT 2010, vol. 6110 of Lecture Notes in Computer Science, pp. 62–91, Springer, Berlin, Heidelberg, Germany, 2010. View at Publisher · View at Google Scholar · View at MathSciNet
  5. T. Okamoto and K. Takashima, “Fully secure functional encryption with general relations from the decisional linear assumption,” in Advances in Cryptology—CRYPTO 2010, vol. 6223 of Lecture Notes in Computer Science, pp. 191–208, Springer, Berlin, Heidelberg, Germany, 2010. View at Publisher · View at Google Scholar · View at MathSciNet
  6. K. Emura, A. Miyaji, K. Omote, A. Nomura, and M. Soshi, “A ciphertext-policy attribute-based encryption scheme with constant ciphertext length,” International Journal of Applied Cryptography, vol. 2, no. 1, pp. 46–59, 2010. View at Publisher · View at Google Scholar · View at MathSciNet
  7. C. Guo, R. Zhuang, Y. Jie, Y. Ren, T. Wu, and K.-K. R. Choo, “Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds,” Journal of Medical Systems, vol. 40, no. 11, article 235, 2016. View at Publisher · View at Google Scholar · View at Scopus
  8. L. Liu, J. Lai, R. H. Deng, and Y. Li, “Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment,” Security and Communication Networks, vol. 9, no. 18, pp. 4897–4913, 2016. View at Publisher · View at Google Scholar · View at Scopus
  9. S. Wang, J. Zhou, J. K. Liu, J. Yu, J. Chen, and W. Xie, “An efficient file hierarchy attribute-based encryption scheme in cloud computing,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 6, pp. 1265–1277, 2016. View at Publisher · View at Google Scholar · View at Scopus
  10. M. Chase, “Multi-authority attribute based encryption,” in Theory of Cryptography, vol. 4392 of Lecture Notes in Computer Science, pp. 515–534, Springer, Berlin, Germany, 2007. View at Publisher · View at Google Scholar · View at MathSciNet
  11. A. Lewko and B. Waters, “Decentralizing attribute-based encryption,” in Advances in Cryptology—EUROCRYPT 2011, vol. 6632 of Lecture Notes in Computer Science, pp. 568–588, Springer, Berlin, Heidelberg, Germany, 2011. View at Publisher · View at Google Scholar · View at MathSciNet
  12. A. Guillevic, “Comparing the pairing efficiency over composite-order and prime-order elliptic curves,” in Proceedings of the Applied Cryptography and Network Security: 11th International Conference (ACNS '13), vol. 7954 of Lecture Notes in Computer Science, pp. 357–372, Springer, Berlin, Heidelberg, Germany, 2013. View at Publisher · View at Google Scholar
  13. T. Okamoto and K. Takashima, “Decentralized attribute-based signatures,” in Public-Key Cryptography—PKC 2013, vol. 7778 of Lecture Notes in Computer Science, pp. 125–142, Springer, Berlin, Heidelberg, Germany, 2013. View at Publisher · View at Google Scholar
  14. A. Lewko and B. Waters, “New techniques for dual system encryption and fully secure HIBE with short ciphertexts,” in Proceedings of the Theory of Cryptography Conference (TCC '10), vol. 5978 of Lecture Notes in Computer Science, pp. 455–479, Springer, Berlin, Heidelberg, Germany, 2010. View at Publisher · View at Google Scholar · View at MathSciNet
  15. B. Waters, “Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions,” in Advances in Cryptology—CRYPTO 2009, vol. 5677 of Lecture Notes in Computer Science, pp. 619–636, Springer, Berlin, Heidelberg, Germany, 2009. View at Publisher · View at Google Scholar · View at MathSciNet
  16. J. Chen and H. Wee, “Fully, (almost) tightly secure IBE and dual system groups,” in Advances in Cryptology—CRYPTO 2013. Part II, vol. 8043 of Lecture Notes in Computer Science, pp. 435–460, Springer, Berlin, Heidelberg, Germany, 2013. View at Publisher · View at Google Scholar · View at MathSciNet
  17. D. M. Freeman, “Converting pairing-based cryptosystems from composite-order groups to prime-order groups,” in Advances in Cryptology—EUROCRYPT 2010, vol. 6110 of Lecture Notes in Computer Science, pp. 44–61, Springer, Berlin, Heidelberg, Germany, 2010. View at Publisher · View at Google Scholar · View at MathSciNet
  18. A. Lewko, “Tools for simulating features of composite order bilinear groups in the prime order setting,” in Advances in Cryptology—EUROCRYPT 2012, vol. 7237 of Lecture Notes in Computer Science, pp. 318–335, Springer, Berlin, Heidelberg, Germany, 2012. View at Publisher · View at Google Scholar · View at MathSciNet
  19. T. Okamoto and K. Takashima, “Hierarchical predicate encryption for inner-products,” in Advances in Cryptology—ASIACRYPT 2009, vol. 5912 of Lecture Notes in Computer Science, pp. 214–231, Springer, Berlin, Heidelberg, Germany, 2009. View at Publisher · View at Google Scholar · View at MathSciNet
  20. J. Gong, J. Chen, X. Dong, Z. Cao, and S. Tang, “Extended nested dual system groups, revisited,” in Public-Key Cryptography—PKC 2016. Part I, vol. 9614 of Lecture Notes in Computer Science, pp. 133–163, Springer, Berlin, Heidelberg, Germany, 2016. View at Publisher · View at Google Scholar · View at MathSciNet
  21. R. Ostrovsky, A. Sahai, and B. Waters, “Attribute-based encryption with non-monotonic access structures,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 195–203, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  22. A. Lewko, Y. Rouselakis, and B. Waters, “Achieving leakage resilience through dual system encryption,” in Theory of Cryptography—TCC 2011, vol. 6597 of Lecture Notes in Computer Science, pp. 70–88, Springer, Berlin, Heidelberg, Germany, 2011. View at Publisher · View at Google Scholar · View at MathSciNet
  23. A. Lewko and B. Waters, “Unbounded HIBE and attribute-based encryption,” in Advances in Cryptology—EUROCRYPT 2011, vol. 6632 of Lecture Notes in Computer Science, pp. 547–567, Springer, Berlin, Heidelberg, Germany, 2011. View at Publisher · View at Google Scholar · View at MathSciNet
  24. T. Okamoto and K. Takashima, “Fully secure unbounded inner-product and attribute-based encryption,” in Advances in Cryptology—ASIACRYPT 2012, vol. 7658 of Lecture Notes in Computer Science, pp. 349–366, Springer, Berlin, Heidelberg, Germany, 2012. View at Publisher · View at Google Scholar · View at MathSciNet
  25. M. Chase and S. S. M. Chow, “Improving privacy and security in multi-authority attribute-based encryption,” in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09), pp. 121–130, New York, NY, USA, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  26. H. Lin, Z. Cao, X. Liang, and J. Shao, “Secure threshold multi authority attribute based encryption without a central authority,” Information Sciences, vol. 180, no. 13, pp. 2618–2632, 2010. View at Publisher · View at Google Scholar · View at MathSciNet
  27. S. Müller, S. Katzenbeisser, and C. Eckert, “On multi-authority ciphertext-policy attribute-based encryption,” Bulletin of the Korean Mathematical Society, vol. 46, no. 4, pp. 803–819, 2009. View at Publisher · View at Google Scholar · View at MathSciNet
  28. Z. Liu, Z. Cao, Q. Huang, D. S. Wong, and T. H. Yuen, “Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles,” in Computer Security—ESORICS 2011, vol. 6879 of Lecture Notes in Computer Science, pp. 278–297, Springer, Berlin, Heidelberg, Germany, 2011. View at Publisher · View at Google Scholar · View at Scopus
  29. Y. Rouselakis and B. Waters, “Efficient statically-secure large-universe multi-authority attribute-based encryption,” in Financial Cryptography And Data Security, vol. 8975 of Lecture Notes in Computer Science, pp. 315–332, Springer, Berlin, Heidelberg, Germany, 2015. View at Publisher · View at Google Scholar · View at MathSciNet
  30. H. Ma, G. Zeng, Z. Wang, and J. Xu, “Fully secure multi-authority attribute-based traitor tracing,” Journal of Computational Information Systems, vol. 9, no. 7, pp. 2792–2800, 2013. View at Google Scholar · View at Scopus
  31. J. Li, Q. Huang, X. Chen, S. S. M. Chow, D. S. Wong, and D. Xie, “Multi-authority ciphertext-policy attribute-based encryption with accountability,” in Proceedings of the 6th International Symposium on Information, Computer and Communications Security (ASIACCS '11), pp. 386–390, New York, NY, USA, March 2011. View at Publisher · View at Google Scholar · View at Scopus
  32. Q. Li, J. Ma, R. Li, J. Xiong, and X. Liu, “Large universe decentralized key-policy attribute-based encryption,” Security and Communication Networks, vol. 8, no. 3, pp. 501–509, 2015. View at Publisher · View at Google Scholar · View at Scopus
  33. N. Gorasia, R. R. Srikanth, N. Doshi, and J. Rupareliya, “Improving security in multi authority attribute based encryption with fast decryption,” Procedia Computer Science, vol. 79, pp. 632–639, 2016. View at Publisher · View at Google Scholar · View at Scopus
  34. H. Zhong, W. Zhu, Y. Xu, and J. Cui, “Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage,” Soft Computing, pp. 1–9, 2016. View at Publisher · View at Google Scholar · View at Scopus
  35. K. Zhang, J. Ma, J. Liu, and H. Li, “Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption,” Science China Information Sciences, vol. 59, no. 9, pp. 99–105, 2016. View at Publisher · View at Google Scholar · View at Scopus