Conference paper Open Access

Constant-Size Ciphertext Attribute-based Encryption from Multi-Channel Broadcast Encryption

Canard, Sébastien; Trinh, Viet Cuong


MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">attribute-based encryption, ciphertext-policy, CNF</subfield>
  </datafield>
  <controlfield tag="005">20191104071048.0</controlfield>
  <controlfield tag="001">246802</controlfield>
  <datafield tag="711" ind1=" " ind2=" ">
    <subfield code="d">16-20 December</subfield>
    <subfield code="g">ICISS 2016</subfield>
    <subfield code="a">Twelth International Conference on Information Systems Security</subfield>
    <subfield code="c">Jaipur, India</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Hong Duc University</subfield>
    <subfield code="a">Trinh, Viet Cuong</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">434085</subfield>
    <subfield code="z">md5:f272de2089448eeed228b1d7f9ec5101</subfield>
    <subfield code="u">https://zenodo.org/record/246802/files/Constant-Size-Ciphertext-Attribute-based-Encryption-from-Multi-Channel-Broadcast-Encryption.pdf</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="y">Conference website</subfield>
    <subfield code="u">http://iciss16.mnit.ac.in/</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2016-11-24</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">user-ecfunded</subfield>
    <subfield code="p">user-supercloud</subfield>
    <subfield code="o">oai:zenodo.org:246802</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">Orange Labs</subfield>
    <subfield code="a">Canard, Sébastien</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Constant-Size Ciphertext Attribute-based Encryption from Multi-Channel Broadcast Encryption</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">user-ecfunded</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">user-supercloud</subfield>
  </datafield>
  <datafield tag="536" ind1=" " ind2=" ">
    <subfield code="c">643964</subfield>
    <subfield code="a">USER-CENTRIC MANAGEMENT OF SECURITY AND DEPENDABILITY IN CLOUDS OF CLOUDS</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">http://creativecommons.org/licenses/by-sa/4.0/legalcode</subfield>
    <subfield code="a">Creative Commons Attribution Share Alike 4.0 International</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2">opendefinition.org</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">&lt;p&gt;Attribute-based encryption (ABE) is an extension of traditional public key encryption in which the encryption and decryption&lt;br&gt;
phases are based on user's attributes. More precisely, we focus on ciphertext-policy ABE (CP-ABE) where the secret-key is associated to a set of attributes and the ciphertext is generated with an access policy. It then becomes feasible to decrypt a ciphertext only if one's attributes satisfy the used access policy. CP-ABE scheme with constant-size ciphertext supporting&lt;br&gt;
fine-grained access control has been investigated at AsiaCrypt'15 and then at TCC'16. The former makes use of the conversion technique between ABE and spatial encryption, and the later studies the pair encodings framework. In this paper, we give a new approach to construct such kind of CP-ABE scheme. More precisely, we propose private CP-ABE schemes with constant-size ciphertext, supporting CNF (Conjunctive Normal Form) access policy, with the simple restriction that each attribute can only appear kmax times in the access formula. Our two constructions are based on the BGW scheme at Crypto'05. The rst scheme is basic selective secure (in the standard model) while our second one reaches the selective CCA security (in the random oracle model).&lt;/p&gt;</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.1007/978-3-319-49806-5_10</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">conferencepaper</subfield>
  </datafield>
</record>
47
26
views
downloads
Views 47
Downloads 26
Data volume 11.3 MB
Unique views 47
Unique downloads 25

Share

Cite as