Efficient ciphertext-policy attribute based encryption with hidden policy

  • Authors:
  • Xiaohui Li;Dawu Gu;Yanli Ren;Ning Ding;Kan Yuan

  • Affiliations:
  • Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China;Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China;School of Communication and Information Engineering, Shanghai University, Shanghai, China;Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China;Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China

  • Venue:
  • IDCS'12 Proceedings of the 5th international conference on Internet and Distributed Computing Systems
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

In an anonymous ciphertext-policy attribute-based encryption (CP-ABE) scheme, the encryptor-specified access structure is hidden in ciphertexts. The decryptor gets his secret key from a trust authority according to his attributes. However, he cannot decrypt any ciphertext or guess even what access structure was specified by the encryptor if his attributes do not satisfy the access structure associated with the ciphertext. All previous anonymous CP-ABE schemes are inefficient in that each ciphertext grows linearly with the number of attributes. In this paper, we propose an efficient anonymous CP-ABE scheme that reduces both the length of each ciphertext and the number of pairing operations to a constant level, but still leverages a hidden policy to keep recipients' privacy preserved. Furthermore, our scheme is fully secure in the standard model based on the decisional Bilinear Diffie-Hellman (DBDH) assumption in composite order groups. We remark that in our security definition, only the legitimate decryptor knows access structures associated with ciphertexts.