Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 193426, 13 pages
http://dx.doi.org/10.1155/2014/193426
Review Article

A Survey of Research Progress and Development Tendency of Attribute-Based Encryption

1State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an 710071, China
2School of Life Science and Technology, Xidian University, Xi’an 710071, China
3Department of Computer Science, Wayne State University, Detroit, MI 48202, USA
4Department of Computer Science, Communication University of China, Beijing 100024, China

Received 22 January 2014; Accepted 11 June 2014; Published 2 July 2014

Academic Editor: Gloria Bordogna

Copyright © 2014 Liaojun Pang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the Association for Computing Machinery, vol. 21, no. 2, pp. 120–126, 1978. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  2. L. Pang, H. Li, and Y. Wang, “NMIBAS: a novel multi-receiver ID-based anonymous signcryption with decryption fairness,” Computing and Informatics, vol. 32, no. 3, pp. 441–460, 2013. View at Google Scholar · View at MathSciNet · View at Scopus
  3. L. Pang, H. Li, and Q. Pei, “Improved multicast key management of Chinese wireless local area network security standard,” IET Communications, vol. 6, no. 9, pp. 1126–1130, 2012. View at Publisher · View at Google Scholar · View at Scopus
  4. A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology: Proceedings of (CRYPTO '84), vol. 196 of Lecture Notes in Computer Science, pp. 47–53, Springer, Berlin, Germany, 1985. View at Publisher · View at Google Scholar · View at MathSciNet
  5. A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology—EUROCRYPT 2005, vol. 3494 of Lecture Notes in Computer Science, pp. 457–473, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar · View at MathSciNet
  6. D. Nali, C. Adams, and A. Miri, “Using threshold attribute-based encryption for practical biometric-based access control,” International Journal of Network Security, vol. 1, no. 3, pp. 173–182, 2005. View at Google Scholar · View at Scopus
  7. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06), pp. 89–98, November 2006. View at Publisher · View at Google Scholar · View at Scopus
  8. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proceedings of the IEEE Symposium on Security and Privacy (SP '07), pp. 321–334, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. R. Ostrovsky, A. Sahai, and B. Waters, “Attribute-based encryption with non-monotonic access structures,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 195–203, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  10. A. Lewko, A. Sanais, and B. Waters, “Revocation systems with very small private keys,” in Proceedings of the IEEE Symposium on Security and Privacy (SP '10), pp. 273–285, Oakland, Calif, USA, May 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. N. Attrapadung, B. Libert, and E. de Panafieu, “Expressive key-policy attribute-based encryption with constant-size ciphertexts,” in Public Key Cryptography—PKC 2011, vol. 6571, pp. 90–108, Springer, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  12. V. Goyal, A. Jain, O. Pandey, and A. Sahai, “Bounded ciphertext policy attribute based encryption,” in Automata, Languages and Programming: Part II, vol. 5126 of Lecture Notes in Computer Science, pp. 579–591, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  13. B. Waters, “Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization,” in Public Key Cryptography (PKC '11), pp. 53–70, Springer, Berlin, Germany, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  14. L. Cheung and C. Newport, “Provably secure ciphertext policy ABE,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 456–465, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  15. T. Nishide, K. Yoneyama, and K. Ohta, “Attribute-based encryption with partially hidden encryptor-specified access structures,” in Applied Cryptography and Network Security (ACNS 2008), pp. 111–129, Springer, Berlin, Germany, 2008. View at Google Scholar
  16. K. Emura, A. Miyaji, K. Omote, A. Nomura, and M. Soshi, “A ciphertext-policy attribute-based encryption scheme with constant ciphertext length,” International Journal of Applied Cryptography, vol. 2, no. 1, pp. 46–59, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  17. X. Liang, Z. Cao, H. Lin, and D. Xing, “Provably secure and efficient bounded ciphertext policy attribute based encryption,” in Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security (ASIACCS '09), pp. 343–352, March 2009. View at Publisher · View at Google Scholar · View at Scopus
  18. L. Ibraimi, Q. Tang, P. Hartel, and W. Jonker, “Efficient and provable secure ciphertext-policy attribute-based encryption schemes,” in Information Security Practice and Experience (ISPE 2009), pp. 1–12, Springer, Berlin, Germany, 2009. View at Google Scholar
  19. A. Lewko, T. Okamoto, A. Sahai, and B. Waters, “Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption,” in Advances in Cryptology: EUROCRYPT 2010, vol. 6110 of Lecture Notes in Computer Science, pp. 62–91, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  20. J. Zhang and Z. F. Zhang, “A ciphertext policy attribute-based encryption scheme without pairings,” in Information Security and Cryptology (ISC '12), pp. 324–340, Springer, Berlin, Germany, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  21. N. Attrapadung and H. Imai, “Dual-policy attribute based encryption,” in Applied Cryptography and Network Security, pp. 168–185, Springer, Berlin, Germany, 2009. View at Google Scholar
  22. S. Müller, S. Katzenbeisser, and C. Eckert, “Distributed attribute-based encryption,” in Information Security and Cryptology—ICISC 2008, vol. 5461 of Lecture Notes in Computer Science, pp. 20–36, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar · View at MathSciNet
  23. S. Muller, S. Katzenbeisser, and C. Eckert, “On multi-authority ciphertext-policy attribute-based encryption,” Bulletin of the Korean Mathematical Society, vol. 46, no. 4, pp. 803–819, 2009. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  24. S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proceedings of the IEEE INFOCOM, pp. 1–9, March 2010. View at Publisher · View at Google Scholar · View at Scopus
  25. Q. Tang and D. Ji, “Verifiable attribute based encryption,” International Journal of Network Security, vol. 10, no. 2, pp. 114–120, 2010. View at Google Scholar · View at Scopus
  26. G. Wang, Q. Liu, and J. Wu, “Hierarchical attribute-based encryption for fine-grained access control in cloud storage services,” in Proceeings of the 17th ACM Conference on Computer and Communications Security (CCS '10), pp. 735–737, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  27. G. Wang, Q. Liu, J. Wu, and M. Guo, “Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers,” Computers and Security, vol. 30, no. 5, pp. 320–331, 2011. View at Publisher · View at Google Scholar · View at Scopus
  28. J. E. Liu, Z. G. Wan, and M. Gu, “Hierarchical attribute-set based encryption for scalable, flexible and fine-grained access control in cloud computing,” in Information Security Practice and Experience, pp. 98–107, Springer, Berlin, Germany, 2011. View at Google Scholar
  29. A. Lewko and B. Waters, “Unbounded {HIBE} and attribute-based encryption,” in Advances in Cryptology (EUROCRYPT '11), pp. 547–567, Springer, Berlin, Germany, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  30. M. Asim, T. Ignatenko, M. Petkovic, D. Trivellato, and N. Zannone, “Enforcing access control in virtual organizations using hierarchical attribute-based encryption,” in Proceedings of the 7th International Conference on Availability, Reliability and Security (ARES '12), pp. 212–217, Prague, Czech Republic, August 2012. View at Publisher · View at Google Scholar · View at Scopus
  31. M. Chase, “Multi-authority attribute based encryption,” in Theory of Cryptography, vol. 4392 of Lecture Notes in Computer Science, pp. 515–534, Springer, Berlin, Germany, 2007. View at Publisher · View at Google Scholar · View at MathSciNet
  32. H. Lin, Z. Cao, X. Liang, and J. Shao, “Secure threshold multi authority attribute based encryption without a central authority,” Information Sciences, vol. 180, no. 13, pp. 2618–2632, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  33. V. Bozovic, D. Socek, R. Steinwandt, and V. I. Villanyi, “Multi-authority attribute-based encryption with honest-but-curious central authority,” International Journal of Computer Mathematics, vol. 89, no. 3, pp. 268–283, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  34. M. Chase and S. S. M. Chow, “Improving privacy and security in multi-authority attribute-based encryption,” in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09), pp. 121–130, Chicago, Ill, USA, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  35. A. Lewko and B. Waters, “Decentralizing attribute-based encryption,” in Advances in Cryptology—EUROCRYPT 2011, vol. 6632 of Lecture Notes in Computer Science, pp. 568–588, Springer, Heidelberg, Germany, 2011. View at Publisher · View at Google Scholar · View at MathSciNet
  36. Z. Liu, Z. Cao, Q. Huang, D. S. Wong, and T. H. Yuen, “Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles,” in Proceedings of the European Symposium on Research in Computer Security (ESORICS '11), pp. 278–297, Springer, 2011.
  37. J. Han, W. Susilo, Y. Mu, and J. Yan, “Privacy-preserving decentralized key-policy attribute-based encryption,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 11, pp. 2150–2162, 2012. View at Publisher · View at Google Scholar · View at Scopus
  38. C. Lee, P. Chung, and M. Hwang, “A survey on attribute-based encryption schemes of access control in cloud environments,” International Journal of Network Security, vol. 15, no. 4, pp. 231–240, 2013. View at Google Scholar · View at Scopus
  39. M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, “Secure attribute-based systems,” Journal of Computer Security, vol. 18, no. 5, pp. 799–837, 2010. View at Publisher · View at Google Scholar · View at Scopus
  40. A. Boldyreva, V. Goyal, and V. Kumart, “Identity-based encryption with efficient revocation,” in Proceedings of the 15th ACM conference on Computer and Communications Security (CCS '08), pp. 417–426, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  41. L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated ciphertext-policy attribute-based encryption and its application,” in Information Security Applications, pp. 309–323, Springer, Berlin, Germany, 2009. View at Google Scholar
  42. S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in Proceedings of the 5th ACM Symposium on Information, Computer and Communication Security, (ASIACCS '10), pp. 261–270, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  43. J. Hur and D. K. Noh, “Attribute-based access control with efficient revocation in data outsourcing systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 7, pp. 1214–1221, 2011. View at Publisher · View at Google Scholar · View at Scopus
  44. X. Xie, H. Ma, J. Li, and X. F. Chen, “New ciphertext-policy attribute-based access control with efficient revocation,” in Information and Communication Technology, vol. 7804 of Lecture Notes in Computer Science, pp. 373–382, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar · View at Scopus
  45. N. Attrapadung and H. Imai, “Conjunctive broadcast and attribute-based encryption,” in Pairing-Based Cryptography (Pairing '09), pp. 248–265, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  46. X. Liang, R. Lu, X. Lin, and X. Shen, “Ciphertext policy attribute based encryption with efficient revocation,” Tech. Rep., University of Waterloo, 2010. View at Google Scholar
  47. Q. X. Wu and M. Zhang, “Adaptively secure attribute-based encryption supporting attribute revocation,” China Communications, vol. 9, no. 9, pp. 22–40, 2012. View at Google Scholar · View at Scopus
  48. N. Attrapadung and H. Imai, “Attribute-based encryption supporting direct/indirect revocation modes,” in Cryptography and Coding, vol. 5921 of Lecture Notes in Computer Science, pp. 278–300, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  49. J. Li, K. Ren, and K. Kim, “A2BE: accountable attribute-based encryption for abuse free access control,” IACR Cryptology ePrint Archive, 2009/118, 2009.
  50. J. Li, K. Ren, B. Zhu, and Z. G. Wan, “Privacy-aware attribute-based encryption with user accountability,” in Information Security, vol. 5735 of Lecture Notes in Computer Science, pp. 347–362, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar
  51. J. Li, Q. Huang, X. Chen, S. S. M. Chow, D. S. Wong, and D. Xie, “Multi-authority ciphertext-policy attribute-based encryption with accountability,” in Proceedings of the 6th International Symposium on Information, Computer and Communications Security (ASIACCS '11), pp. 386–390, March 2011. View at Publisher · View at Google Scholar · View at Scopus
  52. S. C. Yu, K. Ren, W. J. Lou, and J. Li, “Defending against key abuse attacks in KP-ABE enabled broadcast systems,” in Security and Privacy in Communication Networks, pp. 311–329, Springer, Berlin, Germany, 2009. View at Google Scholar
  53. Y. Wang, K. Chen, Y. Long, and Z. Liu, “Accountable authority key policy attribute-based encryption,” Science China: Information Sciences, vol. 55, no. 7, pp. 1631–1638, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  54. S. Guo, Y. Zeng, J. Wei, and Q. Xu, “Attribute-based re-encryption scheme in the standard model,” Wuhan University Journal of Natural Sciences, vol. 13, no. 5, pp. 621–625, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  55. X. Liang, Z. Cao, H. Lin, and J. Shao, “Attribute based proxy re-encryption with delegating capabilities,” in Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security (ASIACCS '09), pp. 276–286, March 2009. View at Publisher · View at Google Scholar · View at Scopus
  56. S. Luo, J. B. Hu, and Z. Chen, “Ciphertext policy attribute-based proxy re-encryption,” in Information and Communications Security, pp. 401–415, 2010. View at Google Scholar
  57. J. H. Seo and H. Kim, “Attribute-based proxy re-encryption with a constant number of pairing operations,” Journal of Information and Communication Convergence Engineering, vol. 10, no. 1, pp. 53–60, 2012. View at Google Scholar
  58. K. T. Liang, L. M. Fang et al., “A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security,” IACR Cryptology ePrint Archive 2013/236, 2013. View at Google Scholar
  59. K. Y. Li, “Matrix access structure policy used in attribute-based proxy re-encryption,” http://arxiv.org/abs/1302.6428.
  60. R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, “Secure distributed key generation for discrete-log based cryptosystems,” in Advances in Cryptology—EUROCRYPT ’99, vol. 1592, pp. 295–310, Springer, Berlin, Germany, 1999. View at Publisher · View at Google Scholar
  61. R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, “Robust threshold DSS signatures,” in Advances in Cryptology—EUROCRYPT '96, pp. 354–371, Springer, Berlin, Germany, 1996. View at Publisher · View at Google Scholar
  62. S. Micali, “Efficient certificate revocation,” Tech. Rep. MIT/LCS/TM-542b, 1996. View at Google Scholar
  63. W. Aiello, S. Lodha, and R. Ostrovsky, “Fast digital identity revocation (extended abstract),” in Proceedings of the 18th Annual International Cryptology Conference (CRYPTO '98), pp. 137–152, Springer, 1998.
  64. D. Naor, M. Naor, and J. Lotspiech, “Revocation and tracing schemes for stateless receivers,” in Advances in Cryptology—CRYPTO 2001, vol. 2139 of Lecture Notes in Computer Science, pp. 41–62, Springer, Berlin, Germany, 2001. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  65. B. Libert and D. Vergnaud, “Adaptive-ID secure revocable identity-based encryption,” in Topics in Cryptology—CT-RSA 2009, vol. 5473 of Lecture Notes in Computer Science, pp. 1–15, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  66. J. Staddon, P. Golle, M. Gagne, and P. Rasmussen, “A content-driven access control system,” in Proceedings of the 7th Symposium on Identity and Trust on the Internet (IDtrust '08), pp. 26–35, March 2008. View at Publisher · View at Google Scholar · View at Scopus
  67. M. Mambo and E. Okamoto, “Proxy cryptosystems: delegation of the power to decrypt ciphertexts,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 80, no. 1, pp. 54–62, 1997. View at Google Scholar · View at Scopus
  68. M. Blaze, G. Bleumer, and M. Strauss, “Divertible protocols and atomic proxy cryptography,” in Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT '98), pp. 127–144, Espoo, Finland, 1998.
  69. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” ACM Transactions on Information and System Security, vol. 9, no. 1, pp. 1–30, 2006. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  70. M. Green and G. Ateniese, “Identity-based proxy re-encryption,” in Applied Cryptography and Network Security, pp. 288–306, Springer, Berlin, Germany, 2007. View at Google Scholar