Skip to main content
Log in

Attribute-based encryption with adaptive policy

  • Foundations
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

For the fine-grained data access control, attribute-based encryption (ABE) has become one of the potential components to secure cloud storage and social networks, in which the ciphertext is decrypted by the users with specific attributes instead of the unique identity. According to the access policy, ABE can be classified into three classes: ciphertext-policy (CP) ABE, key-policy (KP) ABE, and dual-policy (DP) ABE, which are, respectively, used to control attributes of data, attributes of users, and both of them. But when multiple requirements coexist, none of the three access policies could be applied directly. The paper proposed the new primitive called generalized policy attribute-based encryption (GP-ABE) firstly. A GP-ABE scheme based on bilinear pairing is designed also. In the proposal, the access structure is set by an identification function. Therefore, it could give different access policies according to different requirements adaptively, i.e., it gives the separate or combined access control on data attribute, user attribute, and both of them. Compared with the existing CP-ABE, KP-ABE, and DP-ABE, GP-ABE presents adaptive access policy while avoiding the additional cost. The proposed scheme is proved to be secure under selective attribute set attacks with q-bilinear Diffie–Hellman exponent assumption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Attrapadung N, Imai H (2009) Dual-policy attribute based encryption. In: Proceedings of the international conference on applied cryptography and network security, pp 168–185

  • Attrapadung N, Yamada S (2015) Duality in ABE: converting attribute based encryption for dual predicate and dual policy via computational encodings. In: Cryptographers’ track at the RSA conference, pp 87–105

  • Bethencourt J, Sahai A, Water B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy, pp 321–334

  • Fahmi A, Abdullah S, Amin F, Siddque N, Ali A (2017) Aggregation operators on triangular cubic fuzzy numbers and its application to multi-criteria decision making problems. J Intell Fuzzy Syst 33:3323–3337

    Article  Google Scholar 

  • Fahmi A, Abdullah S, Amin F, Ali A (2018a) Weighted average rating (War) method for solving group decision making problem using triangular cubic fuzzy hybrid aggregation (Tcfha). Punjab Univ J Math 50(1):23–34

    MathSciNet  Google Scholar 

  • Fahmi A, Abdullah S, Amin F, Ahmed R, Ali A (2018b) Triangular cubic linguistic hesitant fuzzy aggregation operators and their application in group decision making. J Intell Fuzzy Syst 1:1–15

    Google Scholar 

  • Goyal V, Pandey O, Sahai A, Water B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the ACM conference on computer and communications security 2006, Alexandria, Virginia, pp 89–98

  • Kuchta V, Markowitch O (2017) Multi-authority distributed attribute-based encryption with application to searchable encryption on lattices. In: Mycrypt 2016, LNCS, vol 10311, pp 409–435. https://doi.org/10.1007/978-3-319-61273-7_20

  • Li J, Li X, Wang L, He D, Ahmad H, Niu X (2018) Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption. Soft Comput 22:707–714. https://doi.org/10.1007/s00500-017-2482-1

    Article  Google Scholar 

  • Miyaji A, Tran P (2012) Constant-ciphertext-size dual policy attribute based encryption. In: Proceedings of the international conference on cyberspace safety and security, pp 400–413

  • Okamoto T (2010) Fully secure functional encryption with general relations from the decisional linear assumption. In: Proceedings of the conference on CRYPTO 2010, pp 191–208

  • Pandit T, Barua R (2012) Efficient fully secure attribute-based encryption schemes for general access structures. In: Proceedings of the international conference on provable security, pp 193–214

  • Rao YS, Dutta R (2013) Computationally efficient dual-policy attribute based encryption with short ciphertext. In: Proceedings of the international conference on provable security, pp 288–308

  • Sahai A, Water B (2005) Fuzzy identity based encryption. In: Proceedings of the Eurocrypt 2005, Aarhus, Denmark, pp 457–473

  • Water B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceedings of the international workshop public key cryptography, pp 53–70

  • Zhong H, Zhu W, Xu Y, Cui J (2018) Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput 22:243–251

    Article  MATH  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (Nos. 61572521, U1636114, 61772550), National Key Research and Development Plan (2017YFB0802000), and Open Research Fund of State Key Laboratory of Cryptology. The author appreciates Fei Chen and Xi Lin for their hard works in preparing the manuscript. The author is very grateful to the anonymous referees for their comments and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yiliang Han.

Ethics declarations

Conflict of interest

The author declares that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Communicated by A. Di Nola.

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Han, Y. Attribute-based encryption with adaptive policy. Soft Comput 23, 4009–4017 (2019). https://doi.org/10.1007/s00500-018-3370-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-018-3370-z

Keywords

Navigation