Hidden access structure ciphertext policy attribute based encryption with constant length ciphertext

  • Authors:
  • Nishant Doshi;Devesh Jinwala

  • Affiliations:
  • Computer Engineering Department, S V National Institute of Technology, India;Computer Engineering Department, S V National Institute of Technology, India

  • Venue:
  • ADCONS'11 Proceedings of the 2011 international conference on Advanced Computing, Networking and Security
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

In Cipher text Policy Attribute Based Encryption (CP-ABE) scheme, a user is able to decrypt the cipher text only if the pre-specified access structure (also called ciphertext policy) in the ciphertext, matches the attributes defined in the secret key. However, the limitation of the scheme is that the receiver's anonymity is sacrificed as the access structure of the ciphertext reveals the same. The obvious solution to this problem as proposed by proposed by Nishide et al, is to hide ciphertext-policy (hidden access structure). However, although this solution uses reasonably computable decryption policies, it generates the ciphertext of size that is at least, linearly varying with the number of attributes. It also requires additional pairing operations during decryption. We attempt to overcome these limitations in the proposed scheme viz. Ciphertext Policy Attribute Based Encryption with Constant Length (CP-ABE-CL). In our scheme, the ciphertext and secret key remain constant in length, irrespective of the number of attributes chosen. In addition, the decryption algorithm requires fewer and fixed number of pairing operations. Our scheme works for a threshold case: the number of attributes (excluding wildcard attributes) in a policy must be a subset of attributes in a secret key. The proposed scheme supports the positive, negative and wildcard attributes in policy.