## Keywords (7)

Publications
Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes

# Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes,10.1007/978-3-642-00843-6_1,Luan Ibraimi,Qiang Tang,Pieter H. Harte

Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes
In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, the data is encrypted under an access policy defined by a user who encrypts the data and a user secret key is associated with a set of attributes which identify the user. A user can decrypt the ciphertext if and only if his attributes satisfy the access policy. In CP-ABE, since the user enforces the access policy at the encryption phase, the policy moves with the encrypted data. This is important for data storage servers where data confidentiality must be preserved even if the server is compromised or un-trusted. In this paper, we provide an efficient CP-ABE scheme which can express any access policy represented by a formula involving $\wedge$ and $\vee$ boolean operators. The scheme is secure under Decision Bilinear Diffie-Hellman assumption (DBDH). Furthermore, we extend the expressivity of the scheme by including \emph{of} (threshold) operator in addition to $\wedge$ and $\vee$ operators. We provide a comparison with existing CP-ABE schemes and show that our schemes are more efficient. Especially, the computational work done by the decryptor is reduced.
Published in 2009.
View Publication
 The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
More »

## Citation Context (3)

• ...For more details of the proof, the reader can refer to the full version of this paper [13]...
• ...The proposed scheme is proven IND-sAtt-CPA secure under the DBDH assumption as shown in the full version of this paper [13]...

### Luan Ibraimi, et al. Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryp...

• ...Since Sahai and Waters [1] proposed the basic ABE scheme, several more advanced schemes have been developed, such as most notably Ciphertext-Policy ABE schemes (CP-ABE) [2,3,4]...
• ...There are two types of ABE schemes: Key-Policy ABE schemes (KP-ABE) [6] and Ciphertext-Policy ABE schemes (CP-ABE)[2,3,4]...

### Luan Ibraimi, et al. Mediated Ciphertext-Policy Attribute-Based Encryption and Its Applicat...

• ...To satisfy P, Bob must have a secret key associated with at least one from the following attribute sets: (a 1, a 2), (a 3) or (a 1, a 2, a 3). In general, CP-ABE scheme consists of the following four algorithms [8],[9]: • Setup algorithm (MK, PK) ← Setup (1 k): is run by the...

Sort by:

## Citations (5)

### An Encryption Scheme for a Secure Policy Updating(Citations: 1)

Journal: European Journal of Combinatorics - EJC , pp. 399-408, 2010

### Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes(Citations: 5)

Published in 2009.

### Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application(Citations: 3)

Published in 2009.

### Secure management of personal health records by applying attribute-based encryption(Citations: 2)

Journal: Algorithmica , 2009