Survey of Attribute Based Encryption Schemes

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2017 by IJETT Journal
Volume-47 Number-2
Year of Publication : 2017
Authors : Walunj Pratap, Bhagwan Kurhe
DOI :  10.14445/22315381/IJETT-V47P214

Citation 

Walunj Pratap, Bhagwan Kurhe "Survey of Attribute Based Encryption Schemes", International Journal of Engineering Trends and Technology (IJETT), V47(2),88-90 May 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
Since inception of internet security and privacy of are the critical issues faced by researchers. There have been many cryptographic solutions available to solve some of these issues, but as fine grained access control was needed existing cryptographic solutions become unsuitable for supporting such concept, thus researchers came with an idea of ABE and IBE. ABE is new field in PKC and in digital signatures. It uses access policies to control access over encrypted data. This paper covers study of various attribute based encryption schemes proposed by various researchers.

 References

[1] S. Al-Riyami, J. Malone-Lee, and N. Smart. Escrow free encryption supporting cryptographic workflow. In International Journal of Information Security, volume 5, pages 217–230, September 2006.
[2] G. Ateniese, J. Camenisch, S. Hohenberger, and B. de Medeiros. Practical group signatures without random oracles. Cryptology ePrint Archive, Report 2005/385, 2005.
[3] M. Bellare, D. Micciancio, and B. Warinschi. Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. In Advances in Cryptology - EUROCRYPT 2003, volume 2656 of Lecture Notes in Computer Science, pages 614–629. Springer-Verlag, 2003.
[4] M. Bellare, H. Shi, and C. Zhang. Foundations of Group Signatures: The Case of Dynamic Groups. In Topics in Cryptology CT-RSA 2005, volume 3376 of Lecture Notes in Computer Science, pages 136–153. Springer-Verlag, 2005.
[5] I. Blake, G. Seroussi, and N. Smart. Advances in Elliptic Curves in Cryptography. Cambridge University Press, 1 edition, 2004.
[6] D. Boneh and M. Franklin. Identity-Based Encryption from the Weil Pairing. In Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 213–229. Springer-Verlag, 2001.
[7] X. Boyen. Mesh Signatures: How to Leak a Secret with Unwitting and Unwilling Participants. In Advances in Cryptology - EUROCRYPT 2007, volume 4515 of Lecture Notes in Computer Science, pages 210–227. Springer- Verlag, 2007.
[8] L. Cheung and C. Newport. Provably Secure Ciphertext Policy ABE. In ACM Conference on Computer and Communications Security, pages 456–465, 2007.
[9] C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues. In Proceedings of Cryptography and Coding, volume 2260 of Lecture Notes in Computer Science, pages 360–363. Springer-Verlag, 2001.
[10] V. Goyal, O. Pandeyy, A. Sahaiz, and B. Waters. Attribute- Based Encryption for Fine-Grained Access Control of Encrypted Data. In Proceedings of the 13th ACM conference on Computer and communications security, pages 89–98, 2006.
[11] D. Kahn. The Codebreakers, The Story of Secret Writing. MacMillan, 1st edition, 1967.
[12] N. Smart. Cryptography: An Introduction. Mcgraw-Hill College, 2004.
[13] B. Waters. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. Cryptology ePrint Archive, Report 2008/290, 2008. http://eprint.iacr.org/.
[14] M. Myers. Revocation: Options and Challenges. In Financial Cryptography, volume 1465 of Lecture Notes in Computer Science, pages 165–171. Springer-Verlag, 1998.
[15] Rafail Ostrovsky, Amit Sahai, and Brent Waters. Attributebased encryption with non-monotonic access structures. In Proceedings of the 14th ACM conference on Computer and communications security, CCS ‘07, pages 195–203, New York, NY, USA, 2007. ACM.
[16] Ling Cheung and Calvin Newport. Provably secure ciphertext policy abe. In Proceedings of the 14th ACM conference on Computer and communications security, CCS ‘07, pages 456–465, New York, NY, USA, 2007. ACM.
[17] John Bethencourt, Amit Sahai, and Brent Waters. Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and privacy, pages 321–334, 2007.

Keywords
Public Key Cryptography, Attribute Based Encryption and Pairing Based Cryptography.