Open Access Open Access  Restricted Access Subscription or Fee Access

Multi Authority Ciphertext Policy Attribute Based Encryption Schemes with Constant Ciphertext Length: A Survey

Nikita Gorasia, R.R. Srikanth, Nishant Doshi

Abstract


In Attribute Based Encryption (ABE) scheme, properties assume an imperative part. Attribute Based Encryption is scheme based on attributes and using that secret key is produce and it allows access structure who control the user. Properties have been abused to produce a public key for encrypting information and have been utilized as an access policy to control users. The access policy arrangement can be arranged as either key-policy on the other hand ciphertext policy. In this paper, we survey all Ciphertext Policy Attribute Based Encryption (CP-ABE) scheme with constant cipherttext length and Multi Authority Attribute Based Encryption (MA-ABE) scheme based on ciphertext policy. Also it shows comparison table of all schemes.


Keywords


Ciphertext Policy, Constant Ciphetext Length, Multi Authority.

Full Text:

PDF

References


Emura, Keita, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, and Masakazu Soshi, "A ciphertext-policy attribute-based encryption scheme with constant ciphertext length.", In Information Security Practice and Experience, pp. 13-23, 2009.

Herranz, Javier, Fabien Laguillaumie, and Carla Ràfols, "Constant size ciphertexts in threshold attribute-based encryption", In Public Key Cryptography, pp. 19-34, 2010.

Kim, Kitak, Woo Kwon Koo, Jong Hwan Park, and Dong Hoon Lee, "Chosen Ciphertext Secure Ciphertext-Policy Attribute-Based Encryption with Constant Ciphertext Length and Threshold Policy.”

Lai, Junzuo, Robert H. Deng, and Yingjiu Li, "Fully secure cipertext-policy hiding CP-ABE", In Information Security Practice and Experience, pp. 24-39, 2011.

Ge, Aijun, Rui Zhang, Cheng Chen, Chuangui Ma, and Zhenfeng Zhang, "Threshold ciphertext policy attribute-based encryption with constant size ciphertexts", In Information Security and Privacy, pp. 336-349, 2012.

Doshi, Nishant, and Devesh Jinwala, "Hidden access structure ciphertext policy attribute based encryption with constant length ciphertext”, In Advanced Computing, Networking and Security, pp. 515-523, 2012.

Doshi, Nishant, and Devesh Jinwala, "Updating attribute in CP-ABE: A New Approach", IACR Cryptology ePrint Archive: 496, 2012.

Doshi, Nishant, and Devesh Jinwala, "Constant Ciphertext Length in CP-ABE", IACR Cryptology ePrint Archive: 500, 2012.

Doshi, Nishant, and Devesh C. Jinwala, "Fully secure ciphertext policy attribute‐based encryption with constant length ciphertext and faster decryption”, Security and Communication Networks, 2013.

XU, Peng, Yong TANG, Wenbin JIANG, Hai JIN, and Deqing ZOU, "Ciphertext-Policy Attribute-Based Encryption with Short Keys", Chinese Journal of Electronics 23, no. 4, 2014.

Zhang, Yinghui, Dong Zheng, Xiaofeng Chen, Jin Li, and Hui Li, "Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts”, In Provable Security, pp. 259-273, 2014.

Goyal, Vipul, Omkant Pandey, Amit Sahai, and Brent Waters, "Attribute-based encryption for fine-grained access control of encrypted data", In Proceedings of the 13th ACM conference on Computer and communications security, pp. 89-98, 2006.

Chase, Melissa, "Multi-authority attribute based encryption", In Theory of Cryptography, pp. 515-534, 2007.

Sascha Müller, Stefan Katzenbeisser, and Claudia Eckert, “On Multi-authority ciphertext-policy attribute-based encryption”, In:Bulletin of the Korean Mathematical Society 46,no.4 pp. 803-819, 2009.

Chase, Melissa, and Sherman SM Chow, "Improving privacy and security in multi-authority attribute-based encryption", In Proceedings of the 16th ACM conference on Computer and communications security, pp. 121-130, 2009.

Lin, Huang, Zhenfu Cao, Xiaohui Liang, and Jun Shao, "Secure threshold multi authority attribute based encryption without a central authority", Information Sciences 180, no. 13, pp.2618-2632, 2010.

Sahai, Amit, and Brent Waters, "Fuzzy identity-based encryption", In Advances in Cryptology–EUROCRYPT 2005, pp. 457-473, 2005.

Liu, Zhen, Zhenfu Cao, Qiong Huang, Duncan S. Wong, and Tsz Hon Yuen, "Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles", In Computer Security–ESORICS 2011, pp. 278-297, 2011.

Guo, Zhenzhou, Mingchu Li, Yongrui Cui, and Xinxin Fan, "Dynamic Multi-Attribute Based Encryption.", JDCTA: International Journal of Digital Content Technology and its Applications 5, no. 9, pp.281-289, 2010.

Doshi, Nishant, and Devesh Jinwala, "Constant ciphertext length in multi-authority ciphertext policy attribute based encryption.", In Computer and Communication Technology (ICCCT), 2011 2nd International Conference on, pp. 451-456, 2011.

Li, Jin, Qiong Huang, Xiaofeng Chen, Sherman SM Chow, Duncan S. Wong, and Dongqing Xie, "Multi-authority ciphertext-policy attribute-based encryption with accountability", In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 386-390, 2011.

Lewko, A., Waters, B, “Decentralizing Attribute-Based Encryption”, In: CRYPTOLOGY ePrint Archive, Report 2010/351, 2010.

MA, Haiying, Guosun ZENG, Zhanjun WANG, and Jinchao XU, "Fully Secure Multi-authority Attribute-based Traitor Tracing⋆.", Journal of Computational Information Systems 9, no. 7, pp.2793-2800,2013.

Bethencourt, John, Amit Sahai, and Brent Waters, "Ciphertext-policy attribute-based encryption”, In Security and Privacy, 2007. SP'07. IEEE Symposium on, pp. 321-334, 2007.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.