Xiaoyuan Yang, Weidong Du, Xu An Wang, Liqiang Wang
{"title":"Fully Secure Attribute-Based Encryption with Non-monotonic Access Structures","authors":"Xiaoyuan Yang, Weidong Du, Xu An Wang, Liqiang Wang","doi":"10.1109/INCoS.2013.98","DOIUrl":null,"url":null,"abstract":"Along with the development of the Internet, the traditional public key encryption system becomes insufficient for many newly emerging applications, such as the cloud services. Then the ABE is proposed to meet the urgent demands. The study on attribute-based encryption mainly concern on two issues: how to improve its expressibility and achieve stronger security. This paper has proposed a attribute-based encryption scheme that has good property in both two points: our scheme allows a user's private key to be expressed in non-monotonic access structures, and we prove its fully security in the standard model. Furthermore, the performance of our scheme is as efficient as the less expressive and selective security ones.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"62 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INCoS.2013.98","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Along with the development of the Internet, the traditional public key encryption system becomes insufficient for many newly emerging applications, such as the cloud services. Then the ABE is proposed to meet the urgent demands. The study on attribute-based encryption mainly concern on two issues: how to improve its expressibility and achieve stronger security. This paper has proposed a attribute-based encryption scheme that has good property in both two points: our scheme allows a user's private key to be expressed in non-monotonic access structures, and we prove its fully security in the standard model. Furthermore, the performance of our scheme is as efficient as the less expressive and selective security ones.