Efficient Privacy-Preserving Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption

Dijiang Huang (Inventor)

Research output: Patent

Abstract

Encryption schemes are used to protect information transmitted between computers. This includes information used by the military, banking, and emails transmitted through the Internet. As computers have become more advanced, better encryption techniques are needed to keep information secure. Ciphertext Policy Attribute Encryption (CP-ABE) enforces expressive data access policies and each policy consists of a number of attributes. Most existing CP-ABE schemes incur very large ciphertext file size that increases linearly with respect to the number of attributes in the access policy. These schemes are bulky and can become very large files. Researchers at Arizona State University have developed a Constant Size Ciphertext Policy Attribute Encryption program. Encryption with this method significantly reduces the ciphertext to a constant size with any given number of attributes. The program includes a hidden policy construction that protects the recipients privacy. This program is more flexible than existing programs. Additionally, the program reduces the storage size and the time required to communicate information. Potential Applications Military Business and Industry Communication Benefits and Advantages Lower Costs Program uses less computer storage More Secure Better security of information Retrofit Adaptable to existing computers Download Original PDF For more information about the inventor(s) and their research, please see Dr. Dijiang Huang's directory webpage
Original languageEnglish (US)
StatePublished - May 3 2012

Fingerprint

Cryptography
Military applications
Electronic mail
Security of data
Industry
Internet
Communication
Costs

Cite this

@misc{896e9c6cc374450da9a08ba03c1818b9,
title = "Efficient Privacy-Preserving Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption",
abstract = "Encryption schemes are used to protect information transmitted between computers. This includes information used by the military, banking, and emails transmitted through the Internet. As computers have become more advanced, better encryption techniques are needed to keep information secure. Ciphertext Policy Attribute Encryption (CP-ABE) enforces expressive data access policies and each policy consists of a number of attributes. Most existing CP-ABE schemes incur very large ciphertext file size that increases linearly with respect to the number of attributes in the access policy. These schemes are bulky and can become very large files. Researchers at Arizona State University have developed a Constant Size Ciphertext Policy Attribute Encryption program. Encryption with this method significantly reduces the ciphertext to a constant size with any given number of attributes. The program includes a hidden policy construction that protects the recipients privacy. This program is more flexible than existing programs. Additionally, the program reduces the storage size and the time required to communicate information. Potential Applications Military Business and Industry Communication Benefits and Advantages Lower Costs Program uses less computer storage More Secure Better security of information Retrofit Adaptable to existing computers Download Original PDF For more information about the inventor(s) and their research, please see Dr. Dijiang Huang's directory webpage",
author = "Dijiang Huang",
year = "2012",
month = "5",
day = "3",
language = "English (US)",
type = "Patent",

}

TY - PAT

T1 - Efficient Privacy-Preserving Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption

AU - Huang, Dijiang

PY - 2012/5/3

Y1 - 2012/5/3

N2 - Encryption schemes are used to protect information transmitted between computers. This includes information used by the military, banking, and emails transmitted through the Internet. As computers have become more advanced, better encryption techniques are needed to keep information secure. Ciphertext Policy Attribute Encryption (CP-ABE) enforces expressive data access policies and each policy consists of a number of attributes. Most existing CP-ABE schemes incur very large ciphertext file size that increases linearly with respect to the number of attributes in the access policy. These schemes are bulky and can become very large files. Researchers at Arizona State University have developed a Constant Size Ciphertext Policy Attribute Encryption program. Encryption with this method significantly reduces the ciphertext to a constant size with any given number of attributes. The program includes a hidden policy construction that protects the recipients privacy. This program is more flexible than existing programs. Additionally, the program reduces the storage size and the time required to communicate information. Potential Applications Military Business and Industry Communication Benefits and Advantages Lower Costs Program uses less computer storage More Secure Better security of information Retrofit Adaptable to existing computers Download Original PDF For more information about the inventor(s) and their research, please see Dr. Dijiang Huang's directory webpage

AB - Encryption schemes are used to protect information transmitted between computers. This includes information used by the military, banking, and emails transmitted through the Internet. As computers have become more advanced, better encryption techniques are needed to keep information secure. Ciphertext Policy Attribute Encryption (CP-ABE) enforces expressive data access policies and each policy consists of a number of attributes. Most existing CP-ABE schemes incur very large ciphertext file size that increases linearly with respect to the number of attributes in the access policy. These schemes are bulky and can become very large files. Researchers at Arizona State University have developed a Constant Size Ciphertext Policy Attribute Encryption program. Encryption with this method significantly reduces the ciphertext to a constant size with any given number of attributes. The program includes a hidden policy construction that protects the recipients privacy. This program is more flexible than existing programs. Additionally, the program reduces the storage size and the time required to communicate information. Potential Applications Military Business and Industry Communication Benefits and Advantages Lower Costs Program uses less computer storage More Secure Better security of information Retrofit Adaptable to existing computers Download Original PDF For more information about the inventor(s) and their research, please see Dr. Dijiang Huang's directory webpage

M3 - Patent

ER -