Expressive attribute-based encryption with constant-size ciphertexts from the decisional linear assumption

Katsuyuki Takashima*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

28 Citations (Scopus)

Abstract

We propose a key-policy attribute-based encryption (KPABE) scheme with constant-size ciphertexts, whose selective security is proven under the decisional linear (DLIN) assumption in the standard model. The proposed scheme also has semi-adaptively security, which is a recently proposed notion of security. The access structure is expressive, that is given by non-monotone span programs. It also has fast decryption, i.e., a decryption includes only a constant number of pairing operations. As an application of our KP-ABE construction, we also propose a fully secure attribute-based signatures with constant-size secret (signing) keys from the DLIN. For achieving the above results, we employ a hierarchical reduction technique on dual pairing vector spaces and a modified form of pairwise independence lemma specific to our proposed schemes.

Original languageEnglish
Title of host publicationSecurity and Cryptography for Networks - 9th International Conference, SCN 2014, Proceedings
EditorsMichel Abdalla, Roberto de Prisco
PublisherSpringer Verlag
Pages298-317
Number of pages20
ISBN (Electronic)9783319108780
DOIs
Publication statusPublished - 2014
Externally publishedYes
Event9th International Conference on Security and Cryptography for Networks, SCN 2014 - Amalfi, Italy
Duration: 2014 Sep 32014 Sep 5

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8642
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference9th International Conference on Security and Cryptography for Networks, SCN 2014
Country/TerritoryItaly
CityAmalfi
Period14/9/314/9/5

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Expressive attribute-based encryption with constant-size ciphertexts from the decisional linear assumption'. Together they form a unique fingerprint.

Cite this