Result: Constant Size Ciphertexts in Threshold Attribute-Based Encryption

Title:
Constant Size Ciphertexts in Threshold Attribute-Based Encryption
Contributors:
Departament of Matemàtica Aplicada IV Mathematics Applied to Cryptography (MAK), Universitat Politècnica de Catalunya = Université polytechnique de Catalogne [Barcelona] (UPC), Equipe AMACC - Laboratoire GREYC - UMR6072, Groupe de Recherche en Informatique, Image et Instrumentation de Caen (GREYC), Université de Caen Normandie (UNICAEN), Normandie Université (NU)-Normandie Université (NU)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN), Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)-Université de Caen Normandie (UNICAEN), Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)
Source:
13th International Conference on Practice and Theory in Public Key Cryptography 2010. :19-34
Publisher Information:
CCSD, 2010.
Publication Year:
2010
Collection:
collection:CNRS
collection:ENSI-CAEN
collection:GREYC
collection:GREYC-AMACC
collection:COMUE-NORMANDIE
collection:ENSICAEN
collection:UNICAEN
Subject Geographic:
Original Identifier:
HAL: hal-01083535
Document Type:
Conference conferenceObject<br />Conference papers
Language:
English
Relation:
info:eu-repo/semantics/altIdentifier/doi/10.1007/978-3-642-13013-7_2
DOI:
10.1007/978-3-642-13013-7_2
Accession Number:
edshal.hal.01083535v1
Database:
HAL

Further Information

Attribute-based cryptography has emerged in the last years as a promising primitive for digital security. For instance, it provides good solutions to the problem of anonymous access control. In a ciphertext-policy attribute-based encryption scheme, the secret keys of the users depend on their attributes. When encrypting a message, the sender chooses which subset of attributes must be held by a receiver in order to be able to decrypt.All current attribute-based encryption schemes that admit reasonably expressive decryption policies produce ciphertexts whose size depends at least linearly on the number of attributes involved in the policy. In this paper we propose the first scheme whose ciphertexts have constant size. Our scheme works for the threshold case: users authorized to decrypt are those who hold at least t attributes among a certain universe of attributes, for some threshold t chosen by the sender. An extension to the case of weighted threshold decryption policies is possible. The security of the scheme against selective chosen plaintext attacks can be proven in the standard model by reduction to the augmented multi-sequence of exponents decisional Diffie-Hellman (aMSE-DDH) problem