A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram
Ciphertext-policy attribute-based encryption (CP-ABE) is widely used in many cyber physical systems and the Internet of Things for guaranteeing information security. In order to improve the performance and efficiency of CP-ABE, this paper makes a change to the access structure of describing access p...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2017-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/7814199/ |
id |
doaj-917a8ae721aa4bc99dd618997d1572d2 |
---|---|
record_format |
Article |
spelling |
doaj-917a8ae721aa4bc99dd618997d1572d22021-03-29T20:01:11ZengIEEEIEEE Access2169-35362017-01-0151137114510.1109/ACCESS.2017.26519047814199A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision DiagramLong Li0https://orcid.org/0000-0002-7693-9722Tianlong Gu1Liang Chang2Zhoubo Xu3Yining Liu4Junyan Qian5School of Electromechanical Engineering, Guilin University of Electronic Technology, Guilin, ChinaGuangxi Experiment Center of Information Science, Guilin University of Electronic Technology, Guilin, ChinaGuangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, ChinaGuangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, ChinaGuangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, ChinaGuangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, ChinaCiphertext-policy attribute-based encryption (CP-ABE) is widely used in many cyber physical systems and the Internet of Things for guaranteeing information security. In order to improve the performance and efficiency of CP-ABE, this paper makes a change to the access structure of describing access polices in CP-ABE, and presents a new CP-ABE system based on the ordered binary decision diagram (OBDD). The new system makes full use of both the powerful description ability and the high calculating efficiency of OBDD. First, in the access structure, the new system allows multiple occurrences of the same attribute in a strategy, supports both positive attribute and negative attribute in the description of access polices, and can describe free-form access polices by using Boolean operations. Second, in the key generation stage, the size of secret keys generated by the new system is constant and not affected by the number of attributes; furthermore, time complexity of the key generation algorithm is O(1). Third, in the encryption stage, both the time complexity of the encryption algorithm and the size of generated ciphertext are determined by the number of valid paths contained in the OBDD instead of the number of attributes occurring in access polices. Finally, in the decryption stage, the new system supports fast decryption and the time complexity of the decryption algorithm is only O(1). As a result, compared with existing CP-ABE schemes, the new system has better performance and efficiency. It is proved that the new CP-ABE system can also resist collision attack and chosen-plaintext attack under the decisional bilinear Diffie Hellman assumption.https://ieeexplore.ieee.org/document/7814199/Ciphertext-policy attribute-based encryptionordered binary decision diagramaccess structureaccess policydecryption |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Long Li Tianlong Gu Liang Chang Zhoubo Xu Yining Liu Junyan Qian |
spellingShingle |
Long Li Tianlong Gu Liang Chang Zhoubo Xu Yining Liu Junyan Qian A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram IEEE Access Ciphertext-policy attribute-based encryption ordered binary decision diagram access structure access policy decryption |
author_facet |
Long Li Tianlong Gu Liang Chang Zhoubo Xu Yining Liu Junyan Qian |
author_sort |
Long Li |
title |
A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram |
title_short |
A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram |
title_full |
A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram |
title_fullStr |
A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram |
title_full_unstemmed |
A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram |
title_sort |
ciphertext-policy attribute-based encryption based on an ordered binary decision diagram |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2017-01-01 |
description |
Ciphertext-policy attribute-based encryption (CP-ABE) is widely used in many cyber physical systems and the Internet of Things for guaranteeing information security. In order to improve the performance and efficiency of CP-ABE, this paper makes a change to the access structure of describing access polices in CP-ABE, and presents a new CP-ABE system based on the ordered binary decision diagram (OBDD). The new system makes full use of both the powerful description ability and the high calculating efficiency of OBDD. First, in the access structure, the new system allows multiple occurrences of the same attribute in a strategy, supports both positive attribute and negative attribute in the description of access polices, and can describe free-form access polices by using Boolean operations. Second, in the key generation stage, the size of secret keys generated by the new system is constant and not affected by the number of attributes; furthermore, time complexity of the key generation algorithm is O(1). Third, in the encryption stage, both the time complexity of the encryption algorithm and the size of generated ciphertext are determined by the number of valid paths contained in the OBDD instead of the number of attributes occurring in access polices. Finally, in the decryption stage, the new system supports fast decryption and the time complexity of the decryption algorithm is only O(1). As a result, compared with existing CP-ABE schemes, the new system has better performance and efficiency. It is proved that the new CP-ABE system can also resist collision attack and chosen-plaintext attack under the decisional bilinear Diffie Hellman assumption. |
topic |
Ciphertext-policy attribute-based encryption ordered binary decision diagram access structure access policy decryption |
url |
https://ieeexplore.ieee.org/document/7814199/ |
work_keys_str_mv |
AT longli aciphertextpolicyattributebasedencryptionbasedonanorderedbinarydecisiondiagram AT tianlonggu aciphertextpolicyattributebasedencryptionbasedonanorderedbinarydecisiondiagram AT liangchang aciphertextpolicyattributebasedencryptionbasedonanorderedbinarydecisiondiagram AT zhouboxu aciphertextpolicyattributebasedencryptionbasedonanorderedbinarydecisiondiagram AT yiningliu aciphertextpolicyattributebasedencryptionbasedonanorderedbinarydecisiondiagram AT junyanqian aciphertextpolicyattributebasedencryptionbasedonanorderedbinarydecisiondiagram AT longli ciphertextpolicyattributebasedencryptionbasedonanorderedbinarydecisiondiagram AT tianlonggu ciphertextpolicyattributebasedencryptionbasedonanorderedbinarydecisiondiagram AT liangchang ciphertextpolicyattributebasedencryptionbasedonanorderedbinarydecisiondiagram AT zhouboxu ciphertextpolicyattributebasedencryptionbasedonanorderedbinarydecisiondiagram AT yiningliu ciphertextpolicyattributebasedencryptionbasedonanorderedbinarydecisiondiagram AT junyanqian ciphertextpolicyattributebasedencryptionbasedonanorderedbinarydecisiondiagram |
_version_ |
1724195425235238912 |