Extensions to ciphertext-policy attribute-based encryption to support distributed environments
نویسندگان
چکیده
We present several extensions to the ciphertext-policy attribute-based encryption (CP-ABE) scheme, first introduced by Bethencourt, et. al. (2007), to support operation in a distributed environment with multiple attribute authorities. Unlike other efforts in creating a multi-authority attribute-based encryption schemes our extensions allow for each authority to be designated a subset of attributes and work independently in creating user keys (i.e. a user need only contact a single authority for their secret key). Additionally, we show that the presented extensions have a minimal impact on performance compared to standard CPABE and that both the performance of CP-ABE and our extensions can be improved by computing parts of the user and authority keys in parallel. We also discuss the use of CPABE in protecting data confidentiality in public cloud environments.
منابع مشابه
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملEfficient Multi-level Threshold Attribute Based Encryption
Anonymous access control is a very desirable property in various applications e.g. encrypted storage in distributed environments; and attribute based encryption (ABE) is a cryptographic scheme that is targeted to achieve this property. ABE is an encryption mechanism that is useful in settings where the list of users may not be known apriori, but all users may possess certain credentials which c...
متن کاملCiphertext Policy Attribute Based Encryption with Efficient Revocation
Revocation is a vital open problem in almost every cryptosystem dealing with malicious behaviors. In ciphertext policy attribute based encryption, unlike traditional public key cryptosystem, different users may hold the same functional secret keys related with the same attribute set leading to additional difficulties in designing revocation mechanism. In this paper, we propose the ciphertext po...
متن کاملAttribute-based Encryption for Attribute-based Authentication, Authorization, Storage, and Transmission in Distributed Storage Systems
Attribute-based encryption is a form of encryption which offers the capacity to encrypt data such that it is only accessible to individuals holding a satisfactory configuration of attributes. As cloud and distributed computing become more pervasive in both private and public spheres, attribute-based encryption holds potential to address the issue of achieving secure authentication, authorizatio...
متن کاملA Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments
In Attribute-based Encryption (ABE) scheme, attributes play a very important role. Attributes have been exploited to generate a public key for encrypting data and have been used as an access policy to control users’ access. The access policy can be categorized as either key-policy or ciphertext-policy. The key-policy is the access structure on the user’s private key, and the ciphertext-policy i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJCAT
دوره 47 شماره
صفحات -
تاریخ انتشار 2013