Presentation 2007-12-19
Attribute-Based Encryption with Partially Hidden Ciphertext Policies
Takashi NISHIDE, Kazuki YONEYAMA, Kazuo OHTA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) We propose an attribute-based encryption scheme where encryptor-specified policies are hidden. By using our scheme, an encryptor can encrypt data with a hidden access control policy. A decryptor obtains her secret key associated with her attributes from a trusted authority and if the attributes associated with the decryptor's secret key do not satisfy the access control policy associated with the encrypted data, the decryptor cannot decrypt the data nor know what access control policy was specified by the encryptor. We prove security of our construction based on the Decisional Blinear Diffie-Hellman assumption and the Decision Linear assumption. In our security notion, even the legitimate decryptor cannot obtain the information about the access control policy associated with the encrypted data more than the fact that she can decrypt the data.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Attribute-Based Encryption / Recipient Anonymity / Access Control on Encrypted Data
Paper # ISEC2007-125
Date of Issue

Conference Information
Committee ISEC
Conference Date 2007/12/12(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Attribute-Based Encryption with Partially Hidden Ciphertext Policies
Sub Title (in English)
Keyword(1) Attribute-Based Encryption
Keyword(2) Recipient Anonymity
Keyword(3) Access Control on Encrypted Data
1st Author's Name Takashi NISHIDE
1st Author's Affiliation Department of Information and Communication Engineering, The University of Electro-Communications:Hitachi Software Engineering Co., Ltd.()
2nd Author's Name Kazuki YONEYAMA
2nd Author's Affiliation Department of Information and Communication Engineering, The University of Electro-Communications
3rd Author's Name Kazuo OHTA
3rd Author's Affiliation Department of Information and Communication Engineering, The University of Electro-Communications
Date 2007-12-19
Paper # ISEC2007-125
Volume (vol) vol.107
Number (no) 397
Page pp.pp.-
#Pages 8
Date of Issue