Partially Wildcarded Attribute-based Encryption and Its Efficient Construction

Go Ohtake, Yuki Hironaka, Kenjiro Kai, Yosuke Endo, Goichiro Hanaoka, Hajime Watanabe, Shota Yamada, Kouhei Kasamatsu, Takashi Yamakawa, Hideki Imai

2013

Abstract

Many kinds of ciphertext-policy attribute-based encryption (CP-ABE) schemes have been proposed. In CPABE, the set of user attributes is associated with his/her secret key whereas a policy is associated with a ciphertext so that only users whose attributes satisfy the policy can decrypt the ciphertext. CP-ABE may be applied to a variety of services such as access control for file sharing systems and content distribution services. However, CP-ABE costs more for encryption and decryption in comparison with conventional public key encryption schemes since it can handle more flexible policies. In particular, wildcards, which mean that certain attributes are not relevant to the ciphertext policy, are not essential for a certain service. In this paper, we construct a partially wildcarded CP-ABE scheme with a lower decryption cost. In our scheme, the user’s attributes are separated into those requiring wildcards and those not requiring wildcards. Our scheme hence embodies a CP-ABE scheme with a wildcard functionality and an efficient CP-ABE scheme without wildcard functionality. We compare our scheme with the conventional CP-ABE schemes and describe a content distribution service as an application of our scheme.

References

  1. Bethencourt, J., Sahai, A., and Waters, B. (2007). Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy, pages 321-334.
  2. Cheung, L. and Newport, C. (2007). Provably secure ciphertext policy abe. In ACMCCS'07, pages 456-465.
  3. Emura, K., Miyaji, A., Nomura, A., Omote, K., and Soshi, M. (2009). A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In ISPEC, pages 13-23.
  4. Goyal, V., Pandey, O., Sahai, A., and Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. In ACMCCS, pages 89-98.
  5. Katz, J., Sahai, A., and Waters, B. (2008). Predicate encryption supporting disjunctions, polynomial equations, and inner products. In Eurocrypt, pages 146-162.
  6. Lewko, A., Okamoto, T., Sahai, A., Takashima, K., and Waters, B. (2010). Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In Eurocrypt, pages 62-91.
  7. Nishide, T., Yoneyama, K., and Ohta, K. (2008). Attributebased encryption with partially hidden encryptorspecified access structures. In ACNS, pages 111-129.
  8. Okamoto, T. and Takashima, K. (2010). Fully secure functional encryption with general relations from the decisional linear assumption. In Crypto, pages 191-208.
  9. Ostrovsky, R., Sahai, A., and Waters, B. (2007). Attributebased encryption with non-monotonic access structures. In ACMCCS, pages 195-203.
  10. Sahai, A. and Waters, B. (2005). Fuzzy identity-based encryption. In Eurocrypt, pages 457-473.
  11. Waters, B. (2011). Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In PKC, pages 53-70.
  12. Zhang, Y., Kanayama, N., and Okamoto, E. (2008). Java implementation of pairing on elliptic curves over F2m (in japanese). In CSS, pages D2-1.
Download


Paper Citation


in Harvard Style

Ohtake G., Hironaka Y., Kai K., Endo Y., Hanaoka G., Watanabe H., Yamada S., Kasamatsu K., Yamakawa T. and Imai H. (2013). Partially Wildcarded Attribute-based Encryption and Its Efficient Construction . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 339-346. DOI: 10.5220/0004509303390346


in Bibtex Style

@conference{secrypt13,
author={Go Ohtake and Yuki Hironaka and Kenjiro Kai and Yosuke Endo and Goichiro Hanaoka and Hajime Watanabe and Shota Yamada and Kouhei Kasamatsu and Takashi Yamakawa and Hideki Imai},
title={Partially Wildcarded Attribute-based Encryption and Its Efficient Construction},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={339-346},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004509303390346},
isbn={978-989-8565-73-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - Partially Wildcarded Attribute-based Encryption and Its Efficient Construction
SN - 978-989-8565-73-0
AU - Ohtake G.
AU - Hironaka Y.
AU - Kai K.
AU - Endo Y.
AU - Hanaoka G.
AU - Watanabe H.
AU - Yamada S.
AU - Kasamatsu K.
AU - Yamakawa T.
AU - Imai H.
PY - 2013
SP - 339
EP - 346
DO - 10.5220/0004509303390346