CP-ABE scheme supporting partially hidden access policy
Most of the existing ciphertext-policy attribute-based encryption (CP-ABE) schemes that support outsourced decryption do not consider the privacy protection of the ciphertext access policy, while some schemes that support policy hidden have the problem of low access policy matching efficiency. There...
Saved in:
| Main Authors: | , , , , , , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2024-10-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024179/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850123955502841856 |
|---|---|
| author | LIU Xia WANG Xinzu ZHANG Tao CHEN Yingge WANG Rong FENG Chaosheng QIN Zhiguang |
| author_facet | LIU Xia WANG Xinzu ZHANG Tao CHEN Yingge WANG Rong FENG Chaosheng QIN Zhiguang |
| author_sort | LIU Xia |
| collection | DOAJ |
| description | Most of the existing ciphertext-policy attribute-based encryption (CP-ABE) schemes that support outsourced decryption do not consider the privacy protection of the ciphertext access policy, while some schemes that support policy hidden have the problem of low access policy matching efficiency. Therefore, a CP-ABE scheme was proposed that supported access policy hidden and had high efficiency in access policy matching. In this scheme, the attribute values were blinded and a policy hidden access tree was constructed to realize the privacy protection of the access policy. Bloom filter was used to filter attributes and authenticate members, so as to quickly find the minimum set of attributes that meet the access policy and reduce a large number of invalid calculations in the decryption test. Finally, cloud servers with strong computing power for outsourced computing were used to reduce local decryption costs. Theoretical analysis and experimental results show that the proposed scheme can take into account both computational efficiency and policy privacy protection, significantly improving access policy matching efficiency, encryption and decryption speed, and local decryption time is reduced to a constant level. Security analysis demonstrates that the proposed scheme not only protects the privacy of outsourced access policies but also can resist chosen plaintext attacks. |
| format | Article |
| id | doaj-art-1e33b77ac9764eb3afd77c8a2529480d |
| institution | OA Journals |
| issn | 1000-436X |
| language | zho |
| publishDate | 2024-10-01 |
| publisher | Editorial Department of Journal on Communications |
| record_format | Article |
| series | Tongxin xuebao |
| spelling | doaj-art-1e33b77ac9764eb3afd77c8a2529480d2025-08-20T02:34:28ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2024-10-014518019077077728CP-ABE scheme supporting partially hidden access policyLIU XiaWANG XinzuZHANG TaoCHEN YinggeWANG RongFENG ChaoshengQIN ZhiguangMost of the existing ciphertext-policy attribute-based encryption (CP-ABE) schemes that support outsourced decryption do not consider the privacy protection of the ciphertext access policy, while some schemes that support policy hidden have the problem of low access policy matching efficiency. Therefore, a CP-ABE scheme was proposed that supported access policy hidden and had high efficiency in access policy matching. In this scheme, the attribute values were blinded and a policy hidden access tree was constructed to realize the privacy protection of the access policy. Bloom filter was used to filter attributes and authenticate members, so as to quickly find the minimum set of attributes that meet the access policy and reduce a large number of invalid calculations in the decryption test. Finally, cloud servers with strong computing power for outsourced computing were used to reduce local decryption costs. Theoretical analysis and experimental results show that the proposed scheme can take into account both computational efficiency and policy privacy protection, significantly improving access policy matching efficiency, encryption and decryption speed, and local decryption time is reduced to a constant level. Security analysis demonstrates that the proposed scheme not only protects the privacy of outsourced access policies but also can resist chosen plaintext attacks.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024179/CP-ABEhidden policy access treeoutsourced decryptionBloom filter |
| spellingShingle | LIU Xia WANG Xinzu ZHANG Tao CHEN Yingge WANG Rong FENG Chaosheng QIN Zhiguang CP-ABE scheme supporting partially hidden access policy Tongxin xuebao CP-ABE hidden policy access tree outsourced decryption Bloom filter |
| title | CP-ABE scheme supporting partially hidden access policy |
| title_full | CP-ABE scheme supporting partially hidden access policy |
| title_fullStr | CP-ABE scheme supporting partially hidden access policy |
| title_full_unstemmed | CP-ABE scheme supporting partially hidden access policy |
| title_short | CP-ABE scheme supporting partially hidden access policy |
| title_sort | cp abe scheme supporting partially hidden access policy |
| topic | CP-ABE hidden policy access tree outsourced decryption Bloom filter |
| url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024179/ |
| work_keys_str_mv | AT liuxia cpabeschemesupportingpartiallyhiddenaccesspolicy AT wangxinzu cpabeschemesupportingpartiallyhiddenaccesspolicy AT zhangtao cpabeschemesupportingpartiallyhiddenaccesspolicy AT chenyingge cpabeschemesupportingpartiallyhiddenaccesspolicy AT wangrong cpabeschemesupportingpartiallyhiddenaccesspolicy AT fengchaosheng cpabeschemesupportingpartiallyhiddenaccesspolicy AT qinzhiguang cpabeschemesupportingpartiallyhiddenaccesspolicy |