CP-ABE scheme supporting partially hidden access policy

Most of the existing ciphertext-policy attribute-based encryption (CP-ABE) schemes that support outsourced decryption do not consider the privacy protection of the ciphertext access policy, while some schemes that support policy hidden have the problem of low access policy matching efficiency. There...

Full description

Saved in:
Bibliographic Details
Main Authors: LIU Xia, WANG Xinzu, ZHANG Tao, CHEN Yingge, WANG Rong, FENG Chaosheng, QIN Zhiguang
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2024-10-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024179/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850123955502841856
author LIU Xia
WANG Xinzu
ZHANG Tao
CHEN Yingge
WANG Rong
FENG Chaosheng
QIN Zhiguang
author_facet LIU Xia
WANG Xinzu
ZHANG Tao
CHEN Yingge
WANG Rong
FENG Chaosheng
QIN Zhiguang
author_sort LIU Xia
collection DOAJ
description Most of the existing ciphertext-policy attribute-based encryption (CP-ABE) schemes that support outsourced decryption do not consider the privacy protection of the ciphertext access policy, while some schemes that support policy hidden have the problem of low access policy matching efficiency. Therefore, a CP-ABE scheme was proposed that supported access policy hidden and had high efficiency in access policy matching. In this scheme, the attribute values were blinded and a policy hidden access tree was constructed to realize the privacy protection of the access policy. Bloom filter was used to filter attributes and authenticate members, so as to quickly find the minimum set of attributes that meet the access policy and reduce a large number of invalid calculations in the decryption test. Finally, cloud servers with strong computing power for outsourced computing were used to reduce local decryption costs. Theoretical analysis and experimental results show that the proposed scheme can take into account both computational efficiency and policy privacy protection, significantly improving access policy matching efficiency, encryption and decryption speed, and local decryption time is reduced to a constant level. Security analysis demonstrates that the proposed scheme not only protects the privacy of outsourced access policies but also can resist chosen plaintext attacks.
format Article
id doaj-art-1e33b77ac9764eb3afd77c8a2529480d
institution OA Journals
issn 1000-436X
language zho
publishDate 2024-10-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-1e33b77ac9764eb3afd77c8a2529480d2025-08-20T02:34:28ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2024-10-014518019077077728CP-ABE scheme supporting partially hidden access policyLIU XiaWANG XinzuZHANG TaoCHEN YinggeWANG RongFENG ChaoshengQIN ZhiguangMost of the existing ciphertext-policy attribute-based encryption (CP-ABE) schemes that support outsourced decryption do not consider the privacy protection of the ciphertext access policy, while some schemes that support policy hidden have the problem of low access policy matching efficiency. Therefore, a CP-ABE scheme was proposed that supported access policy hidden and had high efficiency in access policy matching. In this scheme, the attribute values were blinded and a policy hidden access tree was constructed to realize the privacy protection of the access policy. Bloom filter was used to filter attributes and authenticate members, so as to quickly find the minimum set of attributes that meet the access policy and reduce a large number of invalid calculations in the decryption test. Finally, cloud servers with strong computing power for outsourced computing were used to reduce local decryption costs. Theoretical analysis and experimental results show that the proposed scheme can take into account both computational efficiency and policy privacy protection, significantly improving access policy matching efficiency, encryption and decryption speed, and local decryption time is reduced to a constant level. Security analysis demonstrates that the proposed scheme not only protects the privacy of outsourced access policies but also can resist chosen plaintext attacks.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024179/CP-ABEhidden policy access treeoutsourced decryptionBloom filter
spellingShingle LIU Xia
WANG Xinzu
ZHANG Tao
CHEN Yingge
WANG Rong
FENG Chaosheng
QIN Zhiguang
CP-ABE scheme supporting partially hidden access policy
Tongxin xuebao
CP-ABE
hidden policy access tree
outsourced decryption
Bloom filter
title CP-ABE scheme supporting partially hidden access policy
title_full CP-ABE scheme supporting partially hidden access policy
title_fullStr CP-ABE scheme supporting partially hidden access policy
title_full_unstemmed CP-ABE scheme supporting partially hidden access policy
title_short CP-ABE scheme supporting partially hidden access policy
title_sort cp abe scheme supporting partially hidden access policy
topic CP-ABE
hidden policy access tree
outsourced decryption
Bloom filter
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024179/
work_keys_str_mv AT liuxia cpabeschemesupportingpartiallyhiddenaccesspolicy
AT wangxinzu cpabeschemesupportingpartiallyhiddenaccesspolicy
AT zhangtao cpabeschemesupportingpartiallyhiddenaccesspolicy
AT chenyingge cpabeschemesupportingpartiallyhiddenaccesspolicy
AT wangrong cpabeschemesupportingpartiallyhiddenaccesspolicy
AT fengchaosheng cpabeschemesupportingpartiallyhiddenaccesspolicy
AT qinzhiguang cpabeschemesupportingpartiallyhiddenaccesspolicy