Skip to main content
placeholder image

Efficient Ciphertext Policy Attribute Based Encryption under Decisional Linear Assumption

Conference Paper


Abstract


  • We propose a new Ciphertext Policy Attribute Based Encryption (CP-ABE) scheme where access structures are defined by AND-Gates with wildcards. One major difference between our scheme and the existing ones is that we can use a single element to represent one attribute, while the previous schemes require three different elements to represent the three possible values (namely positive, negative, and wildcard) of an attribute. Our proposed scheme also achieves both constant-size ciphertext and constant number of decryption operations, and is proven secure under the standard Decision Linear Assumption. Copyright is held by the owner/author(s).

Publication Date


  • 2014

Publisher


Citation


  • Phuong, T. V. X., Yang, G., & Susilo, W. (2014). Efficient Ciphertext Policy Attribute Based Encryption under Decisional Linear Assumption. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 1490-1492). doi:10.1145/2660267.2662358

Scopus Eid


  • 2-s2.0-84910657260

Start Page


  • 1490

End Page


  • 1492

Abstract


  • We propose a new Ciphertext Policy Attribute Based Encryption (CP-ABE) scheme where access structures are defined by AND-Gates with wildcards. One major difference between our scheme and the existing ones is that we can use a single element to represent one attribute, while the previous schemes require three different elements to represent the three possible values (namely positive, negative, and wildcard) of an attribute. Our proposed scheme also achieves both constant-size ciphertext and constant number of decryption operations, and is proven secure under the standard Decision Linear Assumption. Copyright is held by the owner/author(s).

Publication Date


  • 2014

Publisher


Citation


  • Phuong, T. V. X., Yang, G., & Susilo, W. (2014). Efficient Ciphertext Policy Attribute Based Encryption under Decisional Linear Assumption. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 1490-1492). doi:10.1145/2660267.2662358

Scopus Eid


  • 2-s2.0-84910657260

Start Page


  • 1490

End Page


  • 1492