Abstract
In today’s world data is growing enormously. With the advancement in data, there is need of effective data security mechanism to handle this stored or transmitted information. This necessity introduced science of cryptography. Being an effective cryptographic system attribute-based encryption (ABE) became hot topic of research among the researchers. ABE is a kind of public key cryptography system. It uses ciphertext and private key of user for the encryption purpose. This scheme hooked up ciphertext with attributes (e.g., e-mail id, country name) which ensures high level of protection. This ABS scheme ensures data confidentiality and exclusive access policy. This chapter studies basic ABS system followed by brief introduction of few popular algorithms like Public Key Encryption, Public Key Infrastructure, and Identity Based Encryption. It also enlightened two major types of ABE, i.e., Key Policy-ABE (KP-ABE) and Ciphertext Policy-ABE (CP-ABE). Finally, it is concluded with security model of ABE with its comparative popular schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the Association for Computing Machinery, 21(2), 120–126.
Pang, L., Li, H., & Wang, Y. (2013). NMIBAS: A novel multi-receiver ID-based anonymous signcryption with decryption fairness. Computing and Informatics, 32(3), 441–460.
Pang, L., Li, H., & Pei, Q. (2012). Improved multicast key management of Chinese wireless local area network security standard. IET Communications, 6(9), 1126–1130.
Shamir, A. (1985). Identity-based cryptosystems and signature schemes. In Advances in Cryptology: Proceedings of (CRYPTO ‘84), vol. 196 of Lecture Notes in Computer Science (pp. 47–53). Berlin: Springer.
Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. In Advances in Cryptology—EUROCRYPT 20e05, vol. 3494 of Lecture Notes in Computer Science (pp. 457–473). Berlin: Springer.
Lee, C., Chung, P., & Hwang, M. (2013). A survey on attribute-based encryption schemes of access control in cloud environments. International Journal of Network Security, 15(4), 231–240.
Goyal, V., Jain, A., Pandey, O., Sahai, A. “Bounded Ciphertext policy attribute based encryption”. In: Aceto, L., Damgard, I. Goldberg, L.A., Ingolfsdottir, A., Walukiewicz, I. (eds.) ICALP 2008.
Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute- based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on computer and communications security(CCS’06) (pp. 89–98).
Bethencourt, J., Sahai, A., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In Proceedings of the IEEE Symposium on Security and Privacy (SP’07) (pp. 321–334).
Delerablée, C., & Pointcheval, D. (2008). Dynamic threshold public-key encryption. In D. Wagner (Ed.), Advances in cryptology—CRYPTO 2008. Lecture Notes in Computer Science (pp. 317–334). https://doi.org/10.1007/978-3-540-85174-5_18.
Ostrovsky, R., Sahai, A., & Waters, B. (2007). Attribute- based encryption with non-monotonic access structures. In Proceedings of the 14th ACM Conference on Computer and Communications Security(CCS’07) (pp. 195–203).
Lewko, A., Sanais, A., & Waters, B. (2010). Revocation systems with very small private keys. In Proceedings of the IEEE Symposium on Security and Privacy (SP '10) (pp. 273–285). Oakland.
Attrapadung, N., Libert, B., & de Panafieu, E. (2011). Expressive key- policy attribute-based encryption with constant-size cipher- texts. In Public Key Cryptography—PKC2011 (Vol. 6571, pp. 90–108). Springer.
Cheungand, L., & Newport, C. (2007). Provably secure ciphertext policy ABE. In Proceedings of the 14th ACM Conference on Computer and Communications Security(CCS’07) (pp. 456–465).
Nishide, T., Yoneyama, K., & Ohta, K. (2008). Attribute-based encryption with partially hidden encryptor-specified access structures. In Applied Cryptography and Network Security (ACNS 2008) (pp. 111–129). Berlin: Springer.
Emura, K., Miyaji, A., Omote, K., Nomura, A., & Soshi, M. (2010). A cipher text-policy attribute-based encryption scheme with constant cipher text length. International Journal of Applied Cryptography, 2(1), 46–59.
Goyal, V., Jain, A., Pandey, O., & Sahai, A. (2008). Bounded cipher text policy attribute based encryption. In Automata, Languages and Programming: Part II, vol. 5126 of Lecture Notes in Computer Science (pp. 579–591). Berlin: Springer.
Liang, X., Cao, Z., Lin, H., & Xing, D. (2009). Provably secure and efficient bounded cipher text policy attribute based encryption. In Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security(ASIACCS’09) (pp. 343–352).
Ibraimi, L., Tang, Q., Hartel, P., & Jonker, W. (2009). Efficient and provable secure ciphertext-policy attribute-based encryption schemes. In Information Security Practice and Experience (ISPE 2009) (pp. 1–12). Berlin: Springer.
Waters, B. (2011). Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Public key cryptography (PKC ‘11) (pp. 53–70). Berlin: Springer.
Lewko, A., Okamoto, T., Sahai, A., & Waters, B. (2010). Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In Advances in Cryptology: EUROCRYPT 2010, vol. 6110 of Lecture Notes in Computer Science (pp. 62–91). Berlin: Springer.
Zhang, J., & Zhang, Z. F. (2012). A ciphertext policy attribute- based encryption scheme without pairings. In Information Security and Cryptology(ISC’12) (pp. 324–340). Berlin: Springer.
Cheung, L., & Newport, C. (2007). Provably secure ciphertext policy ABE. In Proceedings of the 14th ACM Conference on Computer and Communications Security—CCS 07 (pp. 456–465). https://doi.org/10.1145/1315245.1315302.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Karale, A., Poulkov, V., Lazarova, M. (2021). Attribute-Based Encryption. In: Ahmad, K.A.B., Ahmad, K., Dulhare, U.N. (eds) Functional Encryption. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-60890-3_13
Download citation
DOI: https://doi.org/10.1007/978-3-030-60890-3_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-60889-7
Online ISBN: 978-3-030-60890-3
eBook Packages: EngineeringEngineering (R0)