skip to main content
10.1145/1315245.1315302acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Provably secure ciphertext policy ABE

Published:28 October 2007Publication History

ABSTRACT

In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on attributes. Decryption is enabled if and only if the user's attribute set satisfies the ciphertext access structure. This provides fine-grained access control on shared data in many practical settings, e.g., secure database and IP multicast.

In this paper, we study CP-ABE schemes in which access structures are AND gates on positive and negative attributes. Our basic scheme is proven to be chosen plaintext (CPA) secure under the decisional bilinear Diffie-Hellman (DBDH) assumption. We then apply the Canetti-Halevi-Katz technique to obtain a chosen ciphertext (CCA) secure extension using one-time signatures. The security proof is a reduction to the DBDH assumption and the strong existential unforgeability of the signature primitive.

In addition, we introduce hierarchical attributes to optimize our basic scheme - reducing both ciphertext size and encryption/decryption time while maintaining CPA security. We conclude with a discussion of practical applications of CP-ABE.

References

  1. J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute-based encryption. In Proceedings of the 28th IEEE Symposium on Security and Privacy (Oakland), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. Boneh, C. Gentry, and B. Waters. Collusion resistant broadcast encryption with short ciphertexts and private keys. In Advances in Cryptology - CRYPTO 2005, volume 3621 of LNCS, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. Boneh, E. Shen, and B. Waters. Strongly unforgeable signatures based on computational Diffie-Hellman. In Proceedings of PKC 2006, volume 3958 of LNCS, pages 229--240, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. R. Canetti, S. Halevi, and J. Katz. Chosen ciphertext security from identity based encryption. In Advances in Cryptology EUROCRYPT 2004, volume 3027 of LNCS, pages 207--222, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  5. M. Chase. Multi-authority attribute-based encryption. In Proceedings of the 4th IACR Theory of Cryptography Conference (TCC 2007), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. L. Cheung, J. Cooley, R. Khazan, and C. Newport. Collusion-resistant group key management using attribute-based encryption. Cryptology ePrint Archive Report 2007/161, 2007. Presented at GOCP '07.Google ScholarGoogle Scholar
  7. L. Cheung and C. Newport. Provably secure ciphertext policy ABE. Cryptology ePrint Archive Report 2007/183, 2007. http://eprint.iacr.org/.Google ScholarGoogle Scholar
  8. A. Fiat and M. Noar. Broadcast encryption. In Advances in Cryptology CRYPTO '93, volume 773 of LNCS, pages 480--491, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. E. Fujisaki and T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes. In Advances in Cryptology CRYTO '99, pages 537--554, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and Communications Security (CCS 2006), pages 89--98, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Naor, M. Naor, and J. Lotspiech. Recovation and tracing schemes for stateless receivers. In Advances in Cryptology CRYPTO 2001, volume 2139 of LNCS, pages 41--62, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Piretti, P. Traynor, P. McDaniel, and B. Waters. Secure attribute-based systems. In Proceedings of the 13th ACM conference on Computer and Communications Security (CCS 2006), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Sahai and B. Waters. Fuzzy identity based encryption. In Advances in Cryptology EUROCRYPT 2005, volume 3494 of LNCS, pages 457--473, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology CRYPTO '84, pages 47--53, 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Provably secure ciphertext policy ABE

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '07: Proceedings of the 14th ACM conference on Computer and communications security
        October 2007
        628 pages
        ISBN:9781595937032
        DOI:10.1145/1315245

        Copyright © 2007 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 28 October 2007

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        CCS '07 Paper Acceptance Rate55of302submissions,18%Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader