中国邮电高校学报(英文) ›› 2016, Vol. 23 ›› Issue (3): 18-28.doi: 10.1016/S1005-8885(16)60028-6

• Artificial Intelligence • 上一篇    下一篇

Attribute-based encryption resilient to continual auxiliary leakage with constant size ciphertexts

张乐友1,张静霞1,胡予濮2   

  1. 1. 西安电子科技大学
    2. 西安电子科技大学 计算机网络与信息安全教育部重点实验室
  • 收稿日期:2015-12-09 修回日期:2016-03-19 出版日期:2016-06-28 发布日期:2016-07-05
  • 通讯作者: 张乐友 E-mail:xidianzhangly@126.com
  • 基金资助:

    云端中支持细粒度访问控制策略的属性基加密;标准模型下可证明安全分级身份基研究

Attribute-based encryption resilient to continual auxiliary leakage with constant size ciphertexts

  • Received:2015-12-09 Revised:2016-03-19 Online:2016-06-28 Published:2016-07-05
  • Contact: Le-You Zhang E-mail:xidianzhangly@126.com

摘要: For leakage-resilient ciphertext-policy attribute-based encryption (CP-ABE) at present, the size of the ciphertexts in most of them relies on the number of attributes. How to overcome this shortcoming is a challenge problem. Based on the Goldreich-Levin theorem and dual system encryption, an efficient CP-ABE scheme with constant size ciphertexts is proposed in this paper. It can tolerate leakage on master secret key and attribute-based secret keys with auxiliary inputs. Furthermore, the proposed scheme can be realized as resilience against continual leakage if keys are periodically updated. Under some static assumptions instead of other strong assumptions, the introduced scheme achieves adaptively security in the standard model.

关键词:

抗泄漏

Abstract:

For leakage-resilient ciphertext-policy attribute-based encryption (CP-ABE) at present, the size of the ciphertexts in most of them relies on the number of attributes. How to overcome this shortcoming is a challenge problem. Based on the Goldreich-Levin theorem and dual system encryption, an efficient CP-ABE scheme with constant size ciphertexts is proposed in this paper. It can tolerate leakage on master secret key and attribute-based secret keys with auxiliary inputs. Furthermore, the proposed scheme can be realized as resilience against continual leakage if keys are periodically updated. Under some static assumptions instead of other strong assumptions, the introduced scheme achieves adaptively security in the standard model.

Key words:

leakage-resilient