Ciphertext Policy Attribute Based Access Control For Multiauthority Systems
Abstract
and size of encryption and decryption is depend on the number
of attributes used for encryption and decryption.So if attributes
increased size also increased.There are some multi-authority
CP-ABE scheme in which the authorities need not interact
to generate public information during the system initialization
phase. Besides, the multi-authority ABE eliminates the key
escrow problem, achieves the length of ciphertext optimization
and enhances efficiency of encryption and decryption.We propose
a Ciphertext Policy Attribute Based Access Control Scheme for
multiauthority system.In our system we are going to propose
a system which contains an encryption and decryption process
by using multiple attributes and also we will use attribute
revocation process at each clients as well as server with a multiple
authorities.This multiauthority ABE eliminates the key escrow
problem, achieves the length of ciphertext optimization and
enhances the efficiency of encryption and decryption operations.
Full Text:
PDFReferences
Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for
fine-grained access control of encrypted data, Proc. Thirteenth ACM
Conference on Computer and Communications Security, pp. 89-98, 2006.
ethencourt J, Sahai A, and Waters B, Ciphertextpolicy attribute-based
encryption, Proc. IEEE Symp. Security and Privacy (SP07), pp. 321-334,
May. 2007, doi:10.1109/SP.2007.11.
Waters B, Ciphertext-policy attribute-based encryption: An expressive,
effcient, and provably secure realization, Public Key Cryptography Fourteenth International Conference on Practice and Theory in Public Key
Cryptography, D. Catalano, N. Fazio, R. Gennaro and A. Nicolosi, eds.,
Lecture Notes in Computer Science F6571, International Association for
Cryptologic Research, pp. 53-70 2011.
Emura K, Miyaji A, and Nomura A, A ciphertextpolicy attribute-based
encryption scheme with constant ciphertext length, Information Security
Practice and ExperienceFifth International Conference, F. Bao, H. Li
and G. Wang, eds., Lecture Notes in Computer Science F5451, Berlin:
Springer-Heidelberg, pp. 13-23, 2009.
Herranz J, Laguillaumie F, and Rfols C, Constant size ciphertexts in
threshold attributebased encryption, Public Key Cryptography Thirteenth
International Conference on Practice and Theory in Public Key Cryptography, P.Q. Nguyen and D. Pointcheval, eds., Lecture Notes in Computer
Science F6056, International Association for Cryptologic Research, pp.
-34 2010.
Attrapadung N, Libert B, and Panafieu E.D, Expressive key-policy
attribute-based encryption with constant-size ciphertexts, Public Key Cr
yptographyFourteenth International Conference on Practice and Theory
in Public Key Cryptography, D. Catalano, N. Fazio, R. Gennaro and A.
Nicolosi, eds., Lecture Notes in Computer Science F6571, International
Association for Cryptologic Research, pp. 90-108 201
Chen Cheng, Zhang Zhenfeng, and Feng Dengguo, Efficient ciphertext
policy attributebased encryption with constant-size ciphertext and constant computation-cost, Provable SecurityFifth International Conference,
X. Boyen, and X. Chen, eds., Lecture Notes in Computer Science F6980,
GmbH Berlin: Springer-Verlag, pp. 84-101 2011.
Cheung Land Newport C, Provably secure ciphertext policy ABE,
Proc. Fourteenth ACM Conference on Computer and Communications
Security(CCS007),pp-465,2007 doi:10.1145/1315245.1315302.
Doshi N and Jinwala D, Constant Ciphertext Length in CP-ABE, IACR
Cryptology ePrint Archive, 2012, 2012: 500.
Ge Aijun, Zhang Rui, and Chen Cheng, Threshold ciphertext policy
attribute-based encryption with constant size ciphertexts,Information Security and PrivacySeventeenth Australasian Conference, pp. 336-349,
, doi:10.1007/978- 3-642-31448-3 25.
Attrapadung N, Herranz J, and Laguillaumie F, Attribute-based encryption schemes with constant-size ciphertexts, Theoretical computer science,
vol. 422, pp. 15-38, Mar. 2012.
Chase M, Multi-authority attribute based encryption, Theory of CryptographyFourth Theory of Cryptography Conference, S.P. Vadhan, eds.,
Lecture Notes in Computer Science F4392, Berlin: Springer-Verlag, pp.
-534 2007.
Lin Huang, Cao Zhenfu, Liang Xiaohui, and et al. Secure threshold
multi authority attribute based encryption without a central authority,
Information Sciences, vol. 180, no. 13, pp. 2618- 2632, July. 2010.
Yu Shucheng, Wang Cong, Ren Kui and et al. Attribute based data
sharing with attribute revocation, P ro c . F i f th Symposium on
Information, Computer and Communications Security (ASIACCS 10),
pp. 261-270, 2009, doi:10.1145/1755688.1755720.
Jahid S, Mittal P, and Borisov N, Easier : Encryption-based access
control in social networks with efficient revocation Proc. Sixth ACM
Symposium on Information, Computer and Communications Security
(ASIACCS 11), pp. 411- 415, 2011, doi:10.1145/1966913.1966970.
Hur J and Noh D.K, Attribute-based access control with efficient
revocation in data outsourcing systems, IEEE Trans. Parallel and
Distributed Systems, vol. 22, no. 7, pp. 1214- 1221, July 2011,
doi:10.1109/TPDS.2010.203.
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology