New proof techniques for DLIN-based adaptively secure attribute-based encryption

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

We propose adaptively secure attribute-based encryption (ABE) schemes for boolean formulas over large universe attributes from the decisional linear (DLIN) assumption, which allow attribute reuse in an available formula without the previously employed redundant multiple encoding technique. Thus our KP-(resp. CP-)ABE has non-redundant ciphertexts (resp. secret keys). For achieving the results, we develop a new encoding method for access policy matrix for ABE, by decoupling linear secret sharing (LSS) into its matrix and randomness, and partially randomizing the LSS shares in simulation. The new techniques are of independent interest and we expect it will find another application than ABE.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 22nd Australasian Conference, ACISP 2017, Proceedings
EditorsJosef Pieprzyk, Suriadi Suriadi
PublisherSpringer Verlag
Pages85-105
Number of pages21
ISBN (Print)9783319600543
DOIs
Publication statusPublished - 2017
Externally publishedYes
Event22nd Australasian Conference on Information Security and Privacy, ACISP 2017 - Auckland, New Zealand
Duration: 2017 Jul 32017 Jul 5

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10342 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference22nd Australasian Conference on Information Security and Privacy, ACISP 2017
CountryNew Zealand
CityAuckland
Period17/7/317/7/5

Keywords

  • Adaptive security
  • Attribute-based encryption
  • Multi-use attributes in policy
  • Static assumption

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'New proof techniques for DLIN-based adaptively secure attribute-based encryption'. Together they form a unique fingerprint.

Cite this