Ciphertext-policy attribute-based encryption

被引:3018
作者
Bethencourt, John [1 ]
Sahai, Amit [2 ]
Waters, Brent [3 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] Univ Calif Los Angeles, Los Angeles, CA 90095 USA
[3] SRI Int, Menlo Pk, CA USA
来源
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS | 2007年
基金
中国国家自然科学基金;
关键词
D O I
10.1109/sp.2007.11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such policies is to employ a trusted server to store the data and mediate access control. However, if any server storing the data is compromised, then the confidentiality of the data will be compromised. In this paper we present a system for realizing complex access control on encrypted data that we call Ciphertext-Policy Attribute-Based Encryption. By using our techniques encrypted data can be kept confidential even if the storage server is untrusted; moreover, our methods are secure against collusion attacks. Previous Attribute-Based Encryption systems used attributes to describe the encrypted data and built policies into user's keys,while in our system attributes are used to describe a user's credentials, and a party encrypting data determines a policy for who can decrypt. Thus, our methods are conceptually closer to traditional access control methods such as Role-Based Access Control (RBAC). In addition, we provide an implementation of our system and give performance measurements.
引用
收藏
页码:321 / +
页数:3
相关论文
共 30 条
  • [1] [Anonymous], EUROCRYPT
  • [2] Beimel A., 1996, Doctor Science thesis
  • [3] BELLARE M, 1993, ACM C COMP COMM SEC, P62
  • [4] BENALOH J, 1990, LECT NOTES COMPUT SC, V403, P27
  • [5] Blakley G. R., 1979, AFIPS Conference Proceedings, vol.48. 1979 National Computer Conference, P313, DOI 10.1109/MARK.1979.8817296
  • [6] Hierarchical identity based encryption with constant size ciphertext
    Boneh, D
    Boyen, X
    Goh, EJ
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 440 - 456
  • [7] BONEH D, 2001, LNCS, V2139
  • [8] Bradshaw R.W., 2004, P 11 ACM C COMP COMM, P146, DOI DOI 10.1145/1030083.1030104
  • [9] Brickell E.F., 1989, J COMBIN MATH COMBIN, V6, P105
  • [10] Chosen-ciphertext security from identity-based encryption
    Canetti, R
    Halevi, S
    Katz, J
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 207 - 222