Fully secure ciphertext-policy attribute based encryption with security mediator

Yuechen Chen, Zoe L. Jiang, S. M. Yiu, Joseph K. Liu, Man Ho Allen Au, Xuan Wang

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Abstract

Attribute-Based Encryption (ABE) offers fine-grained decryption policy such that users can do decryption if their attributes satisfy the policy. Such flexibility enables it applicable in various applications in government and business. However, there are two issues that should be solved first before it is deployed in practice, namely user revocation and decryption outsourcing. In this paper, we adopt the slightly modified Lewko et al.’s fully-CCA-secure Ciphertext-Policy-ABE (CPABE) combining with Boneh et al.’s idea of mediated cryptography to propose a CP-ABE with SEcurity Mediator (SEM) supporting immediate user revocation. At the same time, by the introduce of SEM, we intendedly outsource most of the computation workload in decryption to SEM side and leave only one exponentiation and one division at user side for decryption. It is proved fully-RCCA-CCA-secure in random oracle model.

Original languageEnglish
Title of host publicationInformation and Communications Security
Subtitle of host publication16th International Conference, ICICS 2014 Hong Kong, China, December 16–17, 2014 Revised Selected Papers
EditorsLucas C.K. Hui, S.H. Qing, Elaine Shi, S.M. Yiu
Place of PublicationCham Switzerland
PublisherSpringer
Pages274-289
Number of pages16
ISBN (Electronic)9783319219660
ISBN (Print)9783319219653
DOIs
Publication statusPublished - 2015
Externally publishedYes
EventInternational Conference on Information and Communications Security 2014 - Hong Kong, China
Duration: 16 Dec 201417 Dec 2014
Conference number: 16th
http://www.cs.hku.hk/icics2014/

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume8958
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Conference on Information and Communications Security 2014
Abbreviated titleICICS 2014
CountryChina
CityHong Kong
Period16/12/1417/12/14
Internet address

Keywords

  • CP-ABE
  • Decryption outsourcing
  • Dual encryption system
  • Security mediator
  • User revocation

Cite this

Chen, Y., Jiang, Z. L., Yiu, S. M., Liu, J. K., Au, M. H. A., & Wang, X. (2015). Fully secure ciphertext-policy attribute based encryption with security mediator. In L. C.K. Hui, S. H. Qing, E. Shi, & S. M. Yiu (Eds.), Information and Communications Security: 16th International Conference, ICICS 2014 Hong Kong, China, December 16–17, 2014 Revised Selected Papers (pp. 274-289). (Lecture Notes in Computer Science ; Vol. 8958). Cham Switzerland: Springer. https://doi.org/10.1007/978-3-319-21966-0_20
Chen, Yuechen ; Jiang, Zoe L. ; Yiu, S. M. ; Liu, Joseph K. ; Au, Man Ho Allen ; Wang, Xuan. / Fully secure ciphertext-policy attribute based encryption with security mediator. Information and Communications Security: 16th International Conference, ICICS 2014 Hong Kong, China, December 16–17, 2014 Revised Selected Papers. editor / Lucas C.K. Hui ; S.H. Qing ; Elaine Shi ; S.M. Yiu. Cham Switzerland : Springer, 2015. pp. 274-289 (Lecture Notes in Computer Science ).
@inproceedings{014cba62ab894186a70fff8062d79af9,
title = "Fully secure ciphertext-policy attribute based encryption with security mediator",
abstract = "Attribute-Based Encryption (ABE) offers fine-grained decryption policy such that users can do decryption if their attributes satisfy the policy. Such flexibility enables it applicable in various applications in government and business. However, there are two issues that should be solved first before it is deployed in practice, namely user revocation and decryption outsourcing. In this paper, we adopt the slightly modified Lewko et al.’s fully-CCA-secure Ciphertext-Policy-ABE (CPABE) combining with Boneh et al.’s idea of mediated cryptography to propose a CP-ABE with SEcurity Mediator (SEM) supporting immediate user revocation. At the same time, by the introduce of SEM, we intendedly outsource most of the computation workload in decryption to SEM side and leave only one exponentiation and one division at user side for decryption. It is proved fully-RCCA-CCA-secure in random oracle model.",
keywords = "CP-ABE, Decryption outsourcing, Dual encryption system, Security mediator, User revocation",
author = "Yuechen Chen and Jiang, {Zoe L.} and Yiu, {S. M.} and Liu, {Joseph K.} and Au, {Man Ho Allen} and Xuan Wang",
year = "2015",
doi = "10.1007/978-3-319-21966-0_20",
language = "English",
isbn = "9783319219653",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "274--289",
editor = "{C.K. Hui}, Lucas and S.H. Qing and Shi, {Elaine } and Yiu, {S.M. }",
booktitle = "Information and Communications Security",

}

Chen, Y, Jiang, ZL, Yiu, SM, Liu, JK, Au, MHA & Wang, X 2015, Fully secure ciphertext-policy attribute based encryption with security mediator. in L C.K. Hui, SH Qing, E Shi & SM Yiu (eds), Information and Communications Security: 16th International Conference, ICICS 2014 Hong Kong, China, December 16–17, 2014 Revised Selected Papers. Lecture Notes in Computer Science , vol. 8958, Springer, Cham Switzerland, pp. 274-289, International Conference on Information and Communications Security 2014, Hong Kong, China, 16/12/14. https://doi.org/10.1007/978-3-319-21966-0_20

Fully secure ciphertext-policy attribute based encryption with security mediator. / Chen, Yuechen; Jiang, Zoe L.; Yiu, S. M.; Liu, Joseph K.; Au, Man Ho Allen; Wang, Xuan.

Information and Communications Security: 16th International Conference, ICICS 2014 Hong Kong, China, December 16–17, 2014 Revised Selected Papers. ed. / Lucas C.K. Hui; S.H. Qing; Elaine Shi; S.M. Yiu. Cham Switzerland : Springer, 2015. p. 274-289 (Lecture Notes in Computer Science ; Vol. 8958).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

TY - GEN

T1 - Fully secure ciphertext-policy attribute based encryption with security mediator

AU - Chen, Yuechen

AU - Jiang, Zoe L.

AU - Yiu, S. M.

AU - Liu, Joseph K.

AU - Au, Man Ho Allen

AU - Wang, Xuan

PY - 2015

Y1 - 2015

N2 - Attribute-Based Encryption (ABE) offers fine-grained decryption policy such that users can do decryption if their attributes satisfy the policy. Such flexibility enables it applicable in various applications in government and business. However, there are two issues that should be solved first before it is deployed in practice, namely user revocation and decryption outsourcing. In this paper, we adopt the slightly modified Lewko et al.’s fully-CCA-secure Ciphertext-Policy-ABE (CPABE) combining with Boneh et al.’s idea of mediated cryptography to propose a CP-ABE with SEcurity Mediator (SEM) supporting immediate user revocation. At the same time, by the introduce of SEM, we intendedly outsource most of the computation workload in decryption to SEM side and leave only one exponentiation and one division at user side for decryption. It is proved fully-RCCA-CCA-secure in random oracle model.

AB - Attribute-Based Encryption (ABE) offers fine-grained decryption policy such that users can do decryption if their attributes satisfy the policy. Such flexibility enables it applicable in various applications in government and business. However, there are two issues that should be solved first before it is deployed in practice, namely user revocation and decryption outsourcing. In this paper, we adopt the slightly modified Lewko et al.’s fully-CCA-secure Ciphertext-Policy-ABE (CPABE) combining with Boneh et al.’s idea of mediated cryptography to propose a CP-ABE with SEcurity Mediator (SEM) supporting immediate user revocation. At the same time, by the introduce of SEM, we intendedly outsource most of the computation workload in decryption to SEM side and leave only one exponentiation and one division at user side for decryption. It is proved fully-RCCA-CCA-secure in random oracle model.

KW - CP-ABE

KW - Decryption outsourcing

KW - Dual encryption system

KW - Security mediator

KW - User revocation

UR - http://www.scopus.com/inward/record.url?scp=84943651507&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-21966-0_20

DO - 10.1007/978-3-319-21966-0_20

M3 - Conference Paper

SN - 9783319219653

T3 - Lecture Notes in Computer Science

SP - 274

EP - 289

BT - Information and Communications Security

A2 - C.K. Hui, Lucas

A2 - Qing, S.H.

A2 - Shi, Elaine

A2 - Yiu, S.M.

PB - Springer

CY - Cham Switzerland

ER -

Chen Y, Jiang ZL, Yiu SM, Liu JK, Au MHA, Wang X. Fully secure ciphertext-policy attribute based encryption with security mediator. In C.K. Hui L, Qing SH, Shi E, Yiu SM, editors, Information and Communications Security: 16th International Conference, ICICS 2014 Hong Kong, China, December 16–17, 2014 Revised Selected Papers. Cham Switzerland: Springer. 2015. p. 274-289. (Lecture Notes in Computer Science ). https://doi.org/10.1007/978-3-319-21966-0_20