Recipient Anonymous Ciphertext-Policy Attribute-based Broadcast Encryption

نویسندگان

  • Leyou Zhang
  • Hongjian Yin
چکیده

The ciphertext-policy (CP) attribute-based broadcast encryption (CP-ABBE) is a more flexible broadcast encryption (BE), in which the broadcaster encrypts the data with an access policy and a receiver set. Only receivers in the valid set who satisfy the access policy will be able to decrypt the ciphertext. However, most existing CPABBE schemes only pay attention to plaintext privacy rather than access policy privacy and broadcast list privacy. It results in the fact that the adversary can determine the access policy or the broadcast set from ciphertexts and public parameters. However, in the real life, the access policy or the receiver set may be sensitive. To overcome this shortcoming, we propose a recipient anonymous CP-ABBE scheme, where it can protect the description of the access structures and broadcast sets associated with ciphertexts. The proposed scheme achieves full security based on the dual system encryption and constant size ciphertexts.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ciphertext Policy Attribute based Encryption with anonymous access policy

In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt the encrypted message. The policy can be formed with the help of attributes. In CP-ABE, access policy is sent along with the ciphertext. We propose a method in which the access policy need not be sent along with the ciphertext, by which we are able to preserve the privacy of the encryptor. ...

متن کامل

User Revocation Based Anonymous Access Provision for Efficient Cloud User Privacy

Cloud computing is a recent technology provides a flexible, on-demand and low cost feature of computing resources. The Main issue in Cloud Computing is user identity privacy and data content privacy. The User Privacy in Cloud Computing is achieved by various data access control Schemes. Existing Fully Anonymous Access control scheme with decentralized attribute authority provides data content p...

متن کامل

An Attribute-Based Anonymous Broadcast Encryption Scheme with Adaptive Security in the Standard Model

In broadcast encryption schemes, a distribution center broadcasts an encrypted message to a subset S chosen from a universe of receivers and only the intended users are able to decrypt the message. Most broadcast encryption schemes do not provide anonymity and the identities of target receivers are sent in plaintext. However, in several applications, the authorized users’ identities has the sam...

متن کامل

Fully Anonymous Identity-based Broadcast Encryption without Random Oracles

In a broadcast encryption (BE) scheme, a broadcaster can encrypt a message for a set S of users who are listening to a broadcast channel. Most identity-based broadcast encryption (IBBE) schemes are not anonymous, which means the attacker can obtain the identities of all receivers from the ciphertext. Currently, anonymous IBBE schemes are only provably secure in the random oracle model. In this ...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Network Security

دوره 20  شماره 

صفحات  -

تاریخ انتشار 2018