Practical direct chosen ciphertext secure key-policy attribute-based encryption with public ciphertext test

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We propose a direct Key-Policy Attribute-Based Encryption (KP-ABE) scheme with semantic security against adaptively chosen ciphertext attacks (CCA2) in the standard model. Compared with its counterpart with security against chosen-plaintext attacks (CPA), the cost of our scheme is only a Chameleon hash. In contrast to the Boyen-Mei-Waters shrink approach from CPA-secure (l∈+∈1)-Hierarchical Identity Based Encryption ((l∈+∈1)- HIBE) to CCA2-secure l-HIBE, our approach only adds one on-the-fly dummy attribute. Further, our approach only requires that the underlying ABE is selectively secure and allows public ciphertext test. A major obstacle for the security proof in this scenario is that the simulator cannot prepare the challenge ciphertext associated with the on-the-fly dummy attribute due to the selective security constraint. We circumvent this obstacle with a Chameleon hash. Technically, unlike existing use of Chameleon hash in (online/offline) signature applications, our work shows Chameleon hash can also have unique applications in encryption schemes.

Original languageEnglish
Title of host publicationComputer Security, ESORICS 2014 - 19th European Symposium on Research in Computer Security, Proceedings
PublisherSpringer Verlag
Pages91-108
Number of pages18
EditionPART 2
ISBN (Print)9783319112114
DOIs
StatePublished - 2014
Event19th European Symposium on Research in Computer Security, ESORICS 2014 - Wroclaw, Poland
Duration: 7 Sep 201411 Sep 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 2
Volume8713 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference19th European Symposium on Research in Computer Security, ESORICS 2014
Country/TerritoryPoland
CityWroclaw
Period7/09/1411/09/14

Keywords

  • Attribute-Based Encryption
  • Chameleon Hash
  • Chosen Ciphertext Security

Fingerprint

Dive into the research topics of 'Practical direct chosen ciphertext secure key-policy attribute-based encryption with public ciphertext test'. Together they form a unique fingerprint.

Cite this