Abstract:Ciphertext-policy attribute-based encryption scheme is suitable for access control of ciphertext data in cloud environment.Most of the existing attribute-based encryption schemes supporting arithmetic span programs are key-policy schemes with large public parameter scale.By exploiting the double Dual Pair Vector Space(DPVS) technique,a ciphertext-policy attribute-based encryption scheme which has a fixed length of public parameters and supports arithmetic span programs is proposed in this paper.In this scheme,the ciphertext-related access control vector is combined with the random matrix,and the key-related attribute components are combined with the public parameters in the entropy expansion Lemma.The method is designed according to the form of ciphertext and key components given in the entropy expansion Lemma.Finally,the adaptive security of the scheme is proved based on the prime order bilinear entropy extension Lemma and k-Lin difficult assumption.Compared with the existing attribute-based encryption schemes which support arithmetic span programs,the new scheme has the advantages of ciphertext access policy,fixed length of public parameters and adaptive security.
[1] GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data[A].Proceedings of the 13th ACM Conference on Computer and Communications Security[C].USA:ACM,2006.89-98.
[2] 宋衍,韩臻,等.基于访问树的策略隐藏属性加密方案[J].通信学报,2015,36(9):1351-1358. SONG Yan,HAN Zhen,et al.Encryption scheme for policy-based hidden attributes based on access tree[J].Journal on Communications,2015,36(9):1351-1358.(in Chinese)
[3] 刘梦君,刘树波,等.基于LSSS共享矩阵无授权策略的属性密码解密效率提高方案[J].电子学报,2015,43(6):1065-1072. LIU Meng-jun,LIU Shu-bo,et al.A scheme for improving the decryption efficiency of attribute passwords based on the LSSS shared matrix unauthorized policy[J].Acta Electronica Sinica,2015,43(6):1065-1072.(in Chinese)
[4] Cheng Y,Zhou H,Ma J,Wang Z.Efficient CP-ABE with non-monotonic access structures[A].International Conference on Cloud Computing and Security(vol.10603)[C].Berlin:Springer,2017.315-325.
[5] 胡鹏,高海英.一种实现一般电路的密钥策略的属性加密方案[J].软件学报,2016,27(6):1498-1510. HU Peng,GAO Hai-ying.An attribute-based encryption scheme for implementing key strategies for general circuits[J].Journal of Software,2016,27(6):1498-1510.(in Chinese)
[6] Guo Yuyan,Li Jiguo,Zhang Yichen,et al.Hierarchical attribute-based encryption with continuous auxiliary inputs leakage[J].Security and Communication Networks,2016,9(18):4852-4862.
[7] 赵志远,朱智强,等.属性可撤销且密文长度恒定的属性基加密方案[J].电子学报,2018,46(10):2391-2399. ZHAO Zhi-yuan,ZHU Zhi-qiang,et al.Attribute-based encryption scheme with revocable attributes and constant ciphertext length[J].Acta Electronica Sinica,2018,46(10):2391-2399.(in Chinese)
[8] Li Ji-guo,Yao Wei,Zhang Yichen,et al.Flexible and fine-grained attribute-based data storage in cloud computing[J].IEEE Transactions on Services Computing,2016,10(5):785-796.
[9] 李琦,马建峰,等.一种素数阶群上构造的自适应安全的多授权机构CP-ABE方案[J].电子学报,2014,42(4):696-702. LI Qi,MA Jian-feng,et al.A CP-ABE scheme with adaptive security and multi-authorization mechanism constructed on prime order group[J].Acta Electronica Sinica,2014,42(4):696-702.(in Chinese)
[10] Karchmer M,Wigderson A.On span programs[A].Proceedings of the Eighth Annual Structure in Complexity Theory Conference[C].USA:IEEE,1993.102-111.
[11] Ishai Y,Wee H.Partial garbling schemes and their applications[A].International Colloquium on Automata,Languages,and Programming(Part I,volume 8572)[C].Berlin,Heidelberg:Springer,2014.650-662.
[12] Attrapadung N,Hanaoka G,Yamada S.Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs[A].International Conference on the Theory and Application of Cryptology and Information Security(volume 9452)[C].Berlin,Heidelberg:Springer,2015.575-601.
[13] Chen J,Gong J,Kowalczyk L,et al.Unbounded ABE via bilinear entropy expansion,revisited[A].Annual International Conference on the Theory and Applications of Cryptographic Techniques(volume 10820)[C].Berlin,Heidelberg:Springer,2018.503-534.
[14] Chen J,Gay R,Wee H.Improved dual system ABE in prime-order groups via predicate encodings[A].Annual International Conference on the Theory and Applications of Cryptographic Techniques (volume 9057)[C].Berlin,Heidelberg:Springer,2015.595-624.
[15] Lewko A.Tools for simulating features of composite order bilinear groups in the prime order setting[A].Annual International Conference on the Theory and Applications of Cryptographic Techniques(volume 7237)[C].Berlin,Heidelberg:Springer,2012.318-335.
[16] Okamoto T,Takshima K.Fully secure functional encryption with general relations from the decisional linear assumption[A].Annual Cryptology Conference(volume 6223)[C].Berlin,Heidelberg:Springer,2010.191-208.
[17] Chen J,Wee H.Dual systems groups and its applications-compact HIBE and more-Cryptology ePrint Archive[R].2014/265.
[18] Lewko A B,Waters B.New techniques for dual system encryption and fully secure HIBE with short ciphertexts[A].Theory of Cryptography Conference(volume 5978)[C].Berlin,Heidelberg:Springer,2010.455-479.