On efficient ciphertext-policy attribute based encryption and broadcast encryption

Zhibin Zhou, Dijiang Huang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

95 Scopus citations

Abstract

Existing CP-ABE schemes incur very large ciphertext size, which increases linearly with respect to the number of attributes in the access policy. Large ciphertext prevents CPABE from being adopted in the communication constrained environments. In this paper, we proposed a new construction of CP-ABE, named Constant-size CP-ABE (denoted as CCP-ABE) that significantly reduces the ciphertext to a constant size for an AND gate access policy with any given number of attributes. Each ciphertext in CCP-ABE requires only 2 elements on a bilinear group. Based on CCP-ABE, we further proposed an Attribute Based Broadcast Encryption (ABBE) scheme. Compared to existing Broadcast Encryption (BE) schemes, ABBE is more flexible because a broadcasted message can be encrypted by an expressive access policy, either with or without explicit specifying the receivers. Moreover, ABBE significantly reduces the storage and communication overhead to the order of O(logN), where N is the system size.

Original languageEnglish (US)
Title of host publicationCCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security
Pages753-755
Number of pages3
DOIs
StatePublished - 2010
Event17th ACM Conference on Computer and Communications Security, CCS'10 - Chicago, IL, United States
Duration: Oct 4 2010Oct 8 2010

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Conference

Conference17th ACM Conference on Computer and Communications Security, CCS'10
Country/TerritoryUnited States
CityChicago, IL
Period10/4/1010/8/10

Keywords

  • Attribute-based Encryption
  • Broadcast Encryption

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'On efficient ciphertext-policy attribute based encryption and broadcast encryption'. Together they form a unique fingerprint.

Cite this