KP-ABE with Attribute Extension: Towards Functional Encryption Schemes Integration
Title | KP-ABE with Attribute Extension: Towards Functional Encryption Schemes Integration |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Huo, Weiqian, Pei, Jisheng, Zhang, Ke, Ye, Xiaojun |
Conference Name | 2014 Sixth International Symposium on Parallel Architectures, Algorithms and Programming |
Date Published | July 2014 |
Publisher | IEEE |
ISBN Number | 978-1-4799-3845-2 |
Keywords | Access Control, access policies, access policy, authorisation, Collaboration, cryptography, Encryption, fine-grained access control, functional encryption, functional encryption scheme integration, Identity-based encryption, IPE schemes, Iron, key policy attribute based encryption, key-policy attribute-based encryption, key-policy attribute-based encryption with attribute extension, KP-ABE, KP-ABE-AE scheme, optimisation, Optimization, policy-based governance, Probabilistic logic, pubcrawl, Scalability, Searchable encryption, Vectors |
Abstract | To allow fine-grained access control of sensitive data, researchers have proposed various types of functional encryption schemes, such as identity-based encryption, searchable encryption and attribute-based encryption. We observe that it is difficult to define some complex access policies in certain application scenarios by using these schemes individually. In this paper, we attempt to address this problem by proposing a functional encryption approach named Key-Policy Attribute-Based Encryption with Attribute Extension (KP-ABE-AE). In this approach, we utilize extended attributes to integrate various encryption schemes that support different access policies under a common top-level KP-ABE scheme, thus expanding the scope of access policies that can be defined. Theoretical analysis and experimental studies are conducted to demonstrate the applicability of the proposed KP-ABE-AE. We also present an optimization for a special application of KP-ABE-AE where IPE schemes are integrated with a KP-ABE scheme. The optimization results in an integrated scheme with better efficiency when compared to the existing encryption schemes that support the same scope of access policies. |
URL | https://ieeexplore.ieee.org/document/6916470 |
DOI | 10.1109/PAAP.2014.11 |
Citation Key | huo_kp-abe_2014 |
- key policy attribute based encryption
- Vectors
- searchable encryption
- Scalability
- pubcrawl
- Probabilistic logic
- policy-based governance
- optimization
- optimisation
- KP-ABE-AE scheme
- KP-ABE
- key-policy attribute-based encryption with attribute extension
- key-policy attribute-based encryption
- Access Control
- Iron
- IPE schemes
- Identity-based encryption
- functional encryption scheme integration
- functional encryption
- fine-grained access control
- encryption
- Cryptography
- collaboration
- authorisation
- access policy
- access policies