Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control
In the cipher text-policy attribute based encryption scheme, the private key hold by user is associated with a set of attributes while the data is encrypted with an access structure defined by the data provider. In the most proposed schemes, the characteristics of attributes are treated in the ident...
Saved in:
Published in | 2013 5th International Conference on Intelligent Networking and Collaborative Systems pp. 51 - 57 |
---|---|
Main Authors | , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.09.2013
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | In the cipher text-policy attribute based encryption scheme, the private key hold by user is associated with a set of attributes while the data is encrypted with an access structure defined by the data provider. In the most proposed schemes, the characteristics of attributes are treated in the identical level. In the real circumstance, the importance of each attributes is always different. In this paper, we propose a scheme called cipher text-policy weighted attribute based encryption (CP-WABE) while the attributes have different weights according to their importance. The CP-WABE scheme is proved to be security under the decision l-Expanded bilinear Diffie-Hellman exponent (l-Expanded BDHE) assumption, which can be considered as the generalization of traditional CP-ABE scheme when all attributes have equal weight. |
---|---|
AbstractList | In the cipher text-policy attribute based encryption scheme, the private key hold by user is associated with a set of attributes while the data is encrypted with an access structure defined by the data provider. In the most proposed schemes, the characteristics of attributes are treated in the identical level. In the real circumstance, the importance of each attributes is always different. In this paper, we propose a scheme called cipher text-policy weighted attribute based encryption (CP-WABE) while the attributes have different weights according to their importance. The CP-WABE scheme is proved to be security under the decision l-Expanded bilinear Diffie-Hellman exponent (l-Expanded BDHE) assumption, which can be considered as the generalization of traditional CP-ABE scheme when all attributes have equal weight. |
Author | Qi Li Jun Ma Ximeng Liu Jianfeng Ma Jinbo Xiong |
Author_xml | – sequence: 1 surname: Ximeng Liu fullname: Ximeng Liu email: snbnix@gmail.com organization: Sch. of Telecommun. Eng., Xidian Univ., Xi'an, China – sequence: 2 surname: Jianfeng Ma fullname: Jianfeng Ma email: jfma@mail.xidian.edu.cn organization: Sch. of Comput. Sci. & Technol., Xidian Univ., Xi'an, China – sequence: 3 surname: Jinbo Xiong fullname: Jinbo Xiong email: jbxiongfj@gmail.com organization: Sch. of Comput. Sci. & Technol., Xidian Univ., Xi'an, China – sequence: 4 surname: Qi Li fullname: Qi Li email: qilijs@gmail.com organization: Sch. of Comput. Sci. & Technol., Xidian Univ., Xi'an, China – sequence: 5 surname: Jun Ma fullname: Jun Ma email: sijunhan@163.com organization: Sch. of Comput. Sci. & Technol., Xidian Univ., Xi'an, China |
BookMark | eNotjs1KxDAYRSPoQsdZunKTF2j9kvQnWY5l_mBQQQeXQ5p-cQI1KWkE-_ZWdHW4cLicG3Lpg0dC7hjkjIF62D814TXnwETO5AVZqlpCXamyUFLCNTk2bjhjTPidspfQOzPRd3Qf54QdXaUUXfuVkD7qcd5rb-I0JBc8tSHSjfOYbaOeMbvG4DjSJvgUQ39LrqzuR1z-c0GOm_Vbs8sOz9t9szpkhgOkTOquNdyWRv72CJAIZVvYSnCwmqEqWlVq1dVcMs4FVqK2tVW8kBpBd8jEgtz__TpEPA3Rfeo4napKAJdS_ABufU19 |
CODEN | IEEPAD |
CitedBy_id | crossref_primary_10_2139_ssrn_4173677 crossref_primary_10_1109_ACCESS_2020_2975813 crossref_primary_10_1109_TIFS_2016_2549004 crossref_primary_10_1371_journal_pone_0197318 crossref_primary_10_3390_app8122519 crossref_primary_10_1109_JBHI_2021_3075995 |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/INCoS.2013.18 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library Online IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9780769549880 0769549888 |
EndPage | 57 |
ExternalDocumentID | 6630288 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-c200t-8adbc2f5c89549308e05b4f6320fa1e94b95a9d7281223e637f7f9248ae0ade13 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:37:30 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c200t-8adbc2f5c89549308e05b4f6320fa1e94b95a9d7281223e637f7f9248ae0ade13 |
PageCount | 7 |
ParticipantIDs | ieee_primary_6630288 |
PublicationCentury | 2000 |
PublicationDate | 2013-09 |
PublicationDateYYYYMMDD | 2013-09-01 |
PublicationDate_xml | – month: 09 year: 2013 text: 2013-09 |
PublicationDecade | 2010 |
PublicationTitle | 2013 5th International Conference on Intelligent Networking and Collaborative Systems |
PublicationTitleAbbrev | incos |
PublicationYear | 2013 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.6209748 |
Snippet | In the cipher text-policy attribute based encryption scheme, the private key hold by user is associated with a set of attributes while the data is encrypted... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 51 |
SubjectTerms | Access control Access structure Attribute-based Bilinear pairings Educational institutions Encryption Logic gates Polynomials Weighted attribute |
Title | Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control |
URI | https://ieeexplore.ieee.org/document/6630288 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA7bTp5UNvE3OXg0XdakbXLUsTkERdDhbiNNXkCETkZ3cH-9L-ncRDx4CyWkJQn93ku-932EXDnQ3IAfMGWNYdJBwYIECPMGcmW4waQksi0e88lU3s-yWYtcb2thACCSzyAJzXiX7xZ2FY7K-oiOCIeqTdqF1k2t1k42s49Z8OI5kLVEEiw8fpilRKwY75OH77c0FJH3ZFWXiV3_EmD872cckN6uKo8-bfHmkLSg6pLp8C0IAwT-Bms0fulrPO0ER2_qxs4K6C1ilaOjyi4_4y-CYqhKxxhgsrtgERH6RuNEOmyY6z0yHY9ehhO2sUpgFrd5zZRxpU19ZlW4thNcAc9K6XORcm8GoGWpM6NdkSKepwJyUfjCY-qlDHDjYCCOSKdaVHBMqLIYYfC0xDzJSw0WAwaFY5hcgsyE8yekG6Zk_tGoYcw3s3H69-MzspdGA4nAyjonnXq5gguE8bq8jOv3BZ1FoM4 |
link.rule.ids | 310,311,783,787,792,793,799,27937,55086 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT8JAFHxBPOhJDRi_3YNHt5R-bo9KQFQgJkLkRra7bxNjUgwpB_31vt0iGOPBW9M0bbPbdObtzpsBuNKY-RJNmwslJY80ptxagHAjMRHSl1SUOLXFKOlPoodpPK3B9boXBhGd-Aw9e-j28vVcLe1SWYvQkeBQbME28WqRVN1aG-PMFtXB82cr1wo9G-LxIy7FoUVvD4bfz6lEIm_essw99fnLgvG_L7IPzU1fHntaI84B1LBowKTzaq0BrIKDVy6_7MWtd6JmN2UVaIXsltBKs26hFh_uJ8GIrLIeUUx-Z0Mi7LUuOpF1Ku16Eya97rjT56uwBK7oQy-5kDpXgYmVsBt3oS_Qj_PIJGHgG9nGLMqzWGY6DQjRgxCTMDWpoeJLSPSlxnZ4CPViXuARMKGIY_hBTpWSiTJURBkE3UMmEUZxqM0xNOyQzN4rP4zZajRO_j59CTv98XAwG9yPHk9hN3BxElajdQb1crHEcwL1Mr9wc_kFM7OkGQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2013+5th+International+Conference+on+Intelligent+Networking+and+Collaborative+Systems&rft.atitle=Ciphertext-Policy+Weighted+Attribute+Based+Encryption+for+Fine-Grained+Access+Control&rft.au=Ximeng+Liu&rft.au=Jianfeng+Ma&rft.au=Jinbo+Xiong&rft.au=Qi+Li&rft.date=2013-09-01&rft.pub=IEEE&rft.spage=51&rft.epage=57&rft_id=info:doi/10.1109%2FINCoS.2013.18&rft.externalDocID=6630288 |