• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing

Vol. 13, No.5, May 31, 2019
10.3837/tiis.2019.05.029, Download Paper (Free):

Abstract

Ciphertext-policy attribute-based encryption (CP-ABE) is one of the practical technologies to share data over cloud since it can protect data confidentiality and support fine-grained access control on the encrypted data. However, most of the previous schemes only focus on data confidentiality without considering data receiver privacy preserving. Recently, Li et al.(in TIIS, 10(7), 2016.7) proposed a CP-ABE with hidden access policy and testing, where they declare their scheme achieves privacy preserving for the encryptor and decryptor, and also has high decryption efficiency. Unfortunately, in this paper, we show that their scheme fails to achieve hidden access policy at first. It means that any adversary can obtain access policy information by a simple decisional Diffie-Hellman test (DDH-test) attack. Then we give a method to overcome this shortcoming. Security and performance analyses show that the proposed scheme not only achieves the privacy protection for users, but also has higher efficiency than the original one.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
Hongjian Yin, Leyou Zhang and Yilei Cui, "Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing," KSII Transactions on Internet and Information Systems, vol. 13, no. 5, pp. 2768-2780, 2019. DOI: 10.3837/tiis.2019.05.029

[ACM Style]
Yin, H., Zhang, L., and Cui, Y. 2019. Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing. KSII Transactions on Internet and Information Systems, 13, 5, (2019), 2768-2780. DOI: 10.3837/tiis.2019.05.029