Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control

In the cipher text-policy attribute based encryption scheme, the private key hold by user is associated with a set of attributes while the data is encrypted with an access structure defined by the data provider. In the most proposed schemes, the characteristics of attributes are treated in the ident...

Full description

Saved in:
Bibliographic Details
Published in2013 5th International Conference on Intelligent Networking and Collaborative Systems pp. 51 - 57
Main Authors Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Qi Li, Jun Ma
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.09.2013
Subjects
Online AccessGet full text

Cover

Loading…
Abstract In the cipher text-policy attribute based encryption scheme, the private key hold by user is associated with a set of attributes while the data is encrypted with an access structure defined by the data provider. In the most proposed schemes, the characteristics of attributes are treated in the identical level. In the real circumstance, the importance of each attributes is always different. In this paper, we propose a scheme called cipher text-policy weighted attribute based encryption (CP-WABE) while the attributes have different weights according to their importance. The CP-WABE scheme is proved to be security under the decision l-Expanded bilinear Diffie-Hellman exponent (l-Expanded BDHE) assumption, which can be considered as the generalization of traditional CP-ABE scheme when all attributes have equal weight.
AbstractList In the cipher text-policy attribute based encryption scheme, the private key hold by user is associated with a set of attributes while the data is encrypted with an access structure defined by the data provider. In the most proposed schemes, the characteristics of attributes are treated in the identical level. In the real circumstance, the importance of each attributes is always different. In this paper, we propose a scheme called cipher text-policy weighted attribute based encryption (CP-WABE) while the attributes have different weights according to their importance. The CP-WABE scheme is proved to be security under the decision l-Expanded bilinear Diffie-Hellman exponent (l-Expanded BDHE) assumption, which can be considered as the generalization of traditional CP-ABE scheme when all attributes have equal weight.
Author Qi Li
Jun Ma
Ximeng Liu
Jianfeng Ma
Jinbo Xiong
Author_xml – sequence: 1
  surname: Ximeng Liu
  fullname: Ximeng Liu
  email: snbnix@gmail.com
  organization: Sch. of Telecommun. Eng., Xidian Univ., Xi'an, China
– sequence: 2
  surname: Jianfeng Ma
  fullname: Jianfeng Ma
  email: jfma@mail.xidian.edu.cn
  organization: Sch. of Comput. Sci. & Technol., Xidian Univ., Xi'an, China
– sequence: 3
  surname: Jinbo Xiong
  fullname: Jinbo Xiong
  email: jbxiongfj@gmail.com
  organization: Sch. of Comput. Sci. & Technol., Xidian Univ., Xi'an, China
– sequence: 4
  surname: Qi Li
  fullname: Qi Li
  email: qilijs@gmail.com
  organization: Sch. of Comput. Sci. & Technol., Xidian Univ., Xi'an, China
– sequence: 5
  surname: Jun Ma
  fullname: Jun Ma
  email: sijunhan@163.com
  organization: Sch. of Comput. Sci. & Technol., Xidian Univ., Xi'an, China
BookMark eNotjs1KxDAYRSPoQsdZunKTF2j9kvQnWY5l_mBQQQeXQ5p-cQI1KWkE-_ZWdHW4cLicG3Lpg0dC7hjkjIF62D814TXnwETO5AVZqlpCXamyUFLCNTk2bjhjTPidspfQOzPRd3Qf54QdXaUUXfuVkD7qcd5rb-I0JBc8tSHSjfOYbaOeMbvG4DjSJvgUQ39LrqzuR1z-c0GOm_Vbs8sOz9t9szpkhgOkTOquNdyWRv72CJAIZVvYSnCwmqEqWlVq1dVcMs4FVqK2tVW8kBpBd8jEgtz__TpEPA3Rfeo4napKAJdS_ABufU19
CODEN IEEPAD
CitedBy_id crossref_primary_10_2139_ssrn_4173677
crossref_primary_10_1109_ACCESS_2020_2975813
crossref_primary_10_1109_TIFS_2016_2549004
crossref_primary_10_1371_journal_pone_0197318
crossref_primary_10_3390_app8122519
crossref_primary_10_1109_JBHI_2021_3075995
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/INCoS.2013.18
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library Online
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9780769549880
0769549888
EndPage 57
ExternalDocumentID 6630288
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-c200t-8adbc2f5c89549308e05b4f6320fa1e94b95a9d7281223e637f7f9248ae0ade13
IEDL.DBID RIE
IngestDate Thu Jun 29 18:37:30 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c200t-8adbc2f5c89549308e05b4f6320fa1e94b95a9d7281223e637f7f9248ae0ade13
PageCount 7
ParticipantIDs ieee_primary_6630288
PublicationCentury 2000
PublicationDate 2013-09
PublicationDateYYYYMMDD 2013-09-01
PublicationDate_xml – month: 09
  year: 2013
  text: 2013-09
PublicationDecade 2010
PublicationTitle 2013 5th International Conference on Intelligent Networking and Collaborative Systems
PublicationTitleAbbrev incos
PublicationYear 2013
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.6209748
Snippet In the cipher text-policy attribute based encryption scheme, the private key hold by user is associated with a set of attributes while the data is encrypted...
SourceID ieee
SourceType Publisher
StartPage 51
SubjectTerms Access control
Access structure
Attribute-based
Bilinear pairings
Educational institutions
Encryption
Logic gates
Polynomials
Weighted attribute
Title Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control
URI https://ieeexplore.ieee.org/document/6630288
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA7bTp5UNvE3OXg0XdakbXLUsTkERdDhbiNNXkCETkZ3cH-9L-ncRDx4CyWkJQn93ku-932EXDnQ3IAfMGWNYdJBwYIECPMGcmW4waQksi0e88lU3s-yWYtcb2thACCSzyAJzXiX7xZ2FY7K-oiOCIeqTdqF1k2t1k42s49Z8OI5kLVEEiw8fpilRKwY75OH77c0FJH3ZFWXiV3_EmD872cckN6uKo8-bfHmkLSg6pLp8C0IAwT-Bms0fulrPO0ER2_qxs4K6C1ilaOjyi4_4y-CYqhKxxhgsrtgERH6RuNEOmyY6z0yHY9ehhO2sUpgFrd5zZRxpU19ZlW4thNcAc9K6XORcm8GoGWpM6NdkSKepwJyUfjCY-qlDHDjYCCOSKdaVHBMqLIYYfC0xDzJSw0WAwaFY5hcgsyE8yekG6Zk_tGoYcw3s3H69-MzspdGA4nAyjonnXq5gguE8bq8jOv3BZ1FoM4
link.rule.ids 310,311,783,787,792,793,799,27937,55086
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT8JAFHxBPOhJDRi_3YNHt5R-bo9KQFQgJkLkRra7bxNjUgwpB_31vt0iGOPBW9M0bbPbdObtzpsBuNKY-RJNmwslJY80ptxagHAjMRHSl1SUOLXFKOlPoodpPK3B9boXBhGd-Aw9e-j28vVcLe1SWYvQkeBQbME28WqRVN1aG-PMFtXB82cr1wo9G-LxIy7FoUVvD4bfz6lEIm_essw99fnLgvG_L7IPzU1fHntaI84B1LBowKTzaq0BrIKDVy6_7MWtd6JmN2UVaIXsltBKs26hFh_uJ8GIrLIeUUx-Z0Mi7LUuOpF1Ku16Eya97rjT56uwBK7oQy-5kDpXgYmVsBt3oS_Qj_PIJGHgG9nGLMqzWGY6DQjRgxCTMDWpoeJLSPSlxnZ4CPViXuARMKGIY_hBTpWSiTJURBkE3UMmEUZxqM0xNOyQzN4rP4zZajRO_j59CTv98XAwG9yPHk9hN3BxElajdQb1crHEcwL1Mr9wc_kFM7OkGQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2013+5th+International+Conference+on+Intelligent+Networking+and+Collaborative+Systems&rft.atitle=Ciphertext-Policy+Weighted+Attribute+Based+Encryption+for+Fine-Grained+Access+Control&rft.au=Ximeng+Liu&rft.au=Jianfeng+Ma&rft.au=Jinbo+Xiong&rft.au=Qi+Li&rft.date=2013-09-01&rft.pub=IEEE&rft.spage=51&rft.epage=57&rft_id=info:doi/10.1109%2FINCoS.2013.18&rft.externalDocID=6630288