[go: up one dir, main page]

Skip to main content

Attribute-Based Encryption

  • Chapter
  • First Online:
Functional Encryption

Abstract

In today’s world data is growing enormously. With the advancement in data, there is need of effective data security mechanism to handle this stored or transmitted information. This necessity introduced science of cryptography. Being an effective cryptographic system attribute-based encryption (ABE) became hot topic of research among the researchers. ABE is a kind of public key cryptography system. It uses ciphertext and private key of user for the encryption purpose. This scheme hooked up ciphertext with attributes (e.g., e-mail id, country name) which ensures high level of protection. This ABS scheme ensures data confidentiality and exclusive access policy. This chapter studies basic ABS system followed by brief introduction of few popular algorithms like Public Key Encryption, Public Key Infrastructure, and Identity Based Encryption. It also enlightened two major types of ABE, i.e., Key Policy-ABE (KP-ABE) and Ciphertext Policy-ABE (CP-ABE). Finally, it is concluded with security model of ABE with its comparative popular schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the Association for Computing Machinery, 21(2), 120–126.

    Article  MathSciNet  Google Scholar 

  2. Pang, L., Li, H., & Wang, Y. (2013). NMIBAS: A novel multi-receiver ID-based anonymous signcryption with decryption fairness. Computing and Informatics, 32(3), 441–460.

    MathSciNet  MATH  Google Scholar 

  3. Pang, L., Li, H., & Pei, Q. (2012). Improved multicast key management of Chinese wireless local area network security standard. IET Communications, 6(9), 1126–1130.

    Article  Google Scholar 

  4. Shamir, A. (1985). Identity-based cryptosystems and signature schemes. In Advances in Cryptology: Proceedings of (CRYPTO ‘84), vol. 196 of Lecture Notes in Computer Science (pp. 47–53). Berlin: Springer.

    Chapter  Google Scholar 

  5. Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. In Advances in Cryptology—EUROCRYPT 20e05, vol. 3494 of Lecture Notes in Computer Science (pp. 457–473). Berlin: Springer.

    Google Scholar 

  6. Lee, C., Chung, P., & Hwang, M. (2013). A survey on attribute-based encryption schemes of access control in cloud environments. International Journal of Network Security, 15(4), 231–240.

    Google Scholar 

  7. Goyal, V., Jain, A., Pandey, O., Sahai, A. “Bounded Ciphertext policy attribute based encryption”. In: Aceto, L., Damgard, I. Goldberg, L.A., Ingolfsdottir, A., Walukiewicz, I. (eds.) ICALP 2008.

    Google Scholar 

  8. Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute- based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on computer and communications security(CCS’06) (pp. 89–98).

    Google Scholar 

  9. Bethencourt, J., Sahai, A., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In Proceedings of the IEEE Symposium on Security and Privacy (SP’07) (pp. 321–334).

    Google Scholar 

  10. Delerablée, C., & Pointcheval, D. (2008). Dynamic threshold public-key encryption. In D. Wagner (Ed.), Advances in cryptology—CRYPTO 2008. Lecture Notes in Computer Science (pp. 317–334). https://doi.org/10.1007/978-3-540-85174-5_18.

    Chapter  Google Scholar 

  11. Ostrovsky, R., Sahai, A., & Waters, B. (2007). Attribute- based encryption with non-monotonic access structures. In Proceedings of the 14th ACM Conference on Computer and Communications Security(CCS’07) (pp. 195–203).

    Google Scholar 

  12. Lewko, A., Sanais, A., & Waters, B. (2010). Revocation systems with very small private keys. In Proceedings of the IEEE Symposium on Security and Privacy (SP '10) (pp. 273–285). Oakland.

    Google Scholar 

  13. Attrapadung, N., Libert, B., & de Panafieu, E. (2011). Expressive key- policy attribute-based encryption with constant-size cipher- texts. In Public Key Cryptography—PKC2011 (Vol. 6571, pp. 90–108). Springer.

    Google Scholar 

  14. Cheungand, L., & Newport, C. (2007). Provably secure ciphertext policy ABE. In Proceedings of the 14th ACM Conference on Computer and Communications Security(CCS’07) (pp. 456–465).

    Google Scholar 

  15. Nishide, T., Yoneyama, K., & Ohta, K. (2008). Attribute-based encryption with partially hidden encryptor-specified access structures. In Applied Cryptography and Network Security (ACNS 2008) (pp. 111–129). Berlin: Springer.

    Chapter  Google Scholar 

  16. Emura, K., Miyaji, A., Omote, K., Nomura, A., & Soshi, M. (2010). A cipher text-policy attribute-based encryption scheme with constant cipher text length. International Journal of Applied Cryptography, 2(1), 46–59.

    Article  MathSciNet  Google Scholar 

  17. Goyal, V., Jain, A., Pandey, O., & Sahai, A. (2008). Bounded cipher text policy attribute based encryption. In Automata, Languages and Programming: Part II, vol. 5126 of Lecture Notes in Computer Science (pp. 579–591). Berlin: Springer.

    Chapter  Google Scholar 

  18. Liang, X., Cao, Z., Lin, H., & Xing, D. (2009). Provably secure and efficient bounded cipher text policy attribute based encryption. In Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security(ASIACCS’09) (pp. 343–352).

    Chapter  Google Scholar 

  19. Ibraimi, L., Tang, Q., Hartel, P., & Jonker, W. (2009). Efficient and provable secure ciphertext-policy attribute-based encryption schemes. In Information Security Practice and Experience (ISPE 2009) (pp. 1–12). Berlin: Springer.

    Google Scholar 

  20. Waters, B. (2011). Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Public key cryptography (PKC ‘11) (pp. 53–70). Berlin: Springer.

    Google Scholar 

  21. Lewko, A., Okamoto, T., Sahai, A., & Waters, B. (2010). Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In Advances in Cryptology: EUROCRYPT 2010, vol. 6110 of Lecture Notes in Computer Science (pp. 62–91). Berlin: Springer.

    Google Scholar 

  22. Zhang, J., & Zhang, Z. F. (2012). A ciphertext policy attribute- based encryption scheme without pairings. In Information Security and Cryptology(ISC’12) (pp. 324–340). Berlin: Springer.

    Chapter  Google Scholar 

  23. Cheung, L., & Newport, C. (2007). Provably secure ciphertext policy ABE. In Proceedings of the 14th ACM Conference on Computer and Communications Security—CCS 07 (pp. 456–465). https://doi.org/10.1145/1315245.1315302.

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Karale, A., Poulkov, V., Lazarova, M. (2021). Attribute-Based Encryption. In: Ahmad, K.A.B., Ahmad, K., Dulhare, U.N. (eds) Functional Encryption. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-60890-3_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-60890-3_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-60889-7

  • Online ISBN: 978-3-030-60890-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics