Abstract
For the fine-grained data access control, attribute-based encryption (ABE) has become one of the potential components to secure cloud storage and social networks, in which the ciphertext is decrypted by the users with specific attributes instead of the unique identity. According to the access policy, ABE can be classified into three classes: ciphertext-policy (CP) ABE, key-policy (KP) ABE, and dual-policy (DP) ABE, which are, respectively, used to control attributes of data, attributes of users, and both of them. But when multiple requirements coexist, none of the three access policies could be applied directly. The paper proposed the new primitive called generalized policy attribute-based encryption (GP-ABE) firstly. A GP-ABE scheme based on bilinear pairing is designed also. In the proposal, the access structure is set by an identification function. Therefore, it could give different access policies according to different requirements adaptively, i.e., it gives the separate or combined access control on data attribute, user attribute, and both of them. Compared with the existing CP-ABE, KP-ABE, and DP-ABE, GP-ABE presents adaptive access policy while avoiding the additional cost. The proposed scheme is proved to be secure under selective attribute set attacks with q-bilinear Diffie–Hellman exponent assumption.
Similar content being viewed by others
References
Attrapadung N, Imai H (2009) Dual-policy attribute based encryption. In: Proceedings of the international conference on applied cryptography and network security, pp 168–185
Attrapadung N, Yamada S (2015) Duality in ABE: converting attribute based encryption for dual predicate and dual policy via computational encodings. In: Cryptographers’ track at the RSA conference, pp 87–105
Bethencourt J, Sahai A, Water B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy, pp 321–334
Fahmi A, Abdullah S, Amin F, Siddque N, Ali A (2017) Aggregation operators on triangular cubic fuzzy numbers and its application to multi-criteria decision making problems. J Intell Fuzzy Syst 33:3323–3337
Fahmi A, Abdullah S, Amin F, Ali A (2018a) Weighted average rating (War) method for solving group decision making problem using triangular cubic fuzzy hybrid aggregation (Tcfha). Punjab Univ J Math 50(1):23–34
Fahmi A, Abdullah S, Amin F, Ahmed R, Ali A (2018b) Triangular cubic linguistic hesitant fuzzy aggregation operators and their application in group decision making. J Intell Fuzzy Syst 1:1–15
Goyal V, Pandey O, Sahai A, Water B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the ACM conference on computer and communications security 2006, Alexandria, Virginia, pp 89–98
Kuchta V, Markowitch O (2017) Multi-authority distributed attribute-based encryption with application to searchable encryption on lattices. In: Mycrypt 2016, LNCS, vol 10311, pp 409–435. https://doi.org/10.1007/978-3-319-61273-7_20
Li J, Li X, Wang L, He D, Ahmad H, Niu X (2018) Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption. Soft Comput 22:707–714. https://doi.org/10.1007/s00500-017-2482-1
Miyaji A, Tran P (2012) Constant-ciphertext-size dual policy attribute based encryption. In: Proceedings of the international conference on cyberspace safety and security, pp 400–413
Okamoto T (2010) Fully secure functional encryption with general relations from the decisional linear assumption. In: Proceedings of the conference on CRYPTO 2010, pp 191–208
Pandit T, Barua R (2012) Efficient fully secure attribute-based encryption schemes for general access structures. In: Proceedings of the international conference on provable security, pp 193–214
Rao YS, Dutta R (2013) Computationally efficient dual-policy attribute based encryption with short ciphertext. In: Proceedings of the international conference on provable security, pp 288–308
Sahai A, Water B (2005) Fuzzy identity based encryption. In: Proceedings of the Eurocrypt 2005, Aarhus, Denmark, pp 457–473
Water B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceedings of the international workshop public key cryptography, pp 53–70
Zhong H, Zhu W, Xu Y, Cui J (2018) Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput 22:243–251
Acknowledgements
This work was supported by the National Natural Science Foundation of China (Nos. 61572521, U1636114, 61772550), National Key Research and Development Plan (2017YFB0802000), and Open Research Fund of State Key Laboratory of Cryptology. The author appreciates Fei Chen and Xi Lin for their hard works in preparing the manuscript. The author is very grateful to the anonymous referees for their comments and suggestions.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The author declares that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Communicated by A. Di Nola.
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Han, Y. Attribute-based encryption with adaptive policy. Soft Comput 23, 4009–4017 (2019). https://doi.org/10.1007/s00500-018-3370-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-018-3370-z