|
Attribute-based encryption scheme with hidden access policy
CHEN Qin MA Dan-dan ZHANG Jin-man DANG Zheng-qin
Journal of Computer Applications
2011, 31 (11):
2969-2972.
DOI: 10.3724/SP.J.1087.2011.02969
In most attribute-based encryption schemes, access policy, which is used to encrypt message by encryptor, is often sent to the decryptor along with the ciphertext, but sometimes the policy itself is sensitive. This paper proposed a new construction to hide the access policy. During the encryption process, encryptor achieve the indistinguishability between the well-formed ciphertext components and the malformed. Compared with other constructions, ours was more efficient by reducing the times of exponent and pairing, and the sizes of ciphertext and keys were smaller. In addition, new attributes could be added in the ciphertext policy after setup was executed and the existing public parameters can remain unchanged. These analyses show the flexibility of construction. Security gets proved based on decisional bilinear Diffie-Hellman assumption.
Related Articles |
Metrics
|
|