Survey of Attribute Based Encryption Schemes
Citation
Walunj Pratap, Bhagwan Kurhe "Survey of Attribute Based Encryption Schemes", International Journal of Engineering Trends and Technology (IJETT), V47(2),88-90 May 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
Since inception of internet security and
privacy of are the critical issues faced by
researchers. There have been many cryptographic
solutions available to solve some of these issues, but
as fine grained access control was needed existing
cryptographic solutions become unsuitable for
supporting such concept, thus researchers came with
an idea of ABE and IBE. ABE is new field in PKC
and in digital signatures. It uses access policies to
control access over encrypted data. This paper
covers study of various attribute based encryption
schemes proposed by various researchers.
References
[1] S. Al-Riyami, J. Malone-Lee, and N. Smart. Escrow free
encryption supporting cryptographic workflow. In
International Journal of Information Security, volume 5,
pages 217–230, September 2006.
[2] G. Ateniese, J. Camenisch, S. Hohenberger, and B. de
Medeiros. Practical group signatures without random
oracles. Cryptology ePrint Archive, Report 2005/385, 2005.
[3] M. Bellare, D. Micciancio, and B. Warinschi. Foundations
of Group Signatures: Formal Definitions, Simplified
Requirements, and a Construction Based on General
Assumptions. In Advances in Cryptology - EUROCRYPT
2003, volume 2656 of Lecture Notes in Computer Science,
pages 614–629. Springer-Verlag, 2003.
[4] M. Bellare, H. Shi, and C. Zhang. Foundations of Group
Signatures: The Case of Dynamic Groups. In Topics in
Cryptology CT-RSA 2005, volume 3376 of Lecture Notes
in Computer Science, pages 136–153. Springer-Verlag,
2005.
[5] I. Blake, G. Seroussi, and N. Smart. Advances in Elliptic
Curves in Cryptography. Cambridge University Press, 1
edition, 2004.
[6] D. Boneh and M. Franklin. Identity-Based Encryption from
the Weil Pairing. In Advances in Cryptology - CRYPTO
2001, volume 2139 of Lecture Notes in Computer Science,
pages 213–229. Springer-Verlag, 2001.
[7] X. Boyen. Mesh Signatures: How to Leak a Secret with
Unwitting and Unwilling Participants. In Advances in
Cryptology - EUROCRYPT 2007, volume 4515 of Lecture
Notes in Computer Science, pages 210–227. Springer-
Verlag, 2007.
[8] L. Cheung and C. Newport. Provably Secure Ciphertext
Policy ABE. In ACM Conference on Computer and
Communications Security, pages 456–465, 2007.
[9] C. Cocks. An Identity Based Encryption Scheme Based on
Quadratic Residues. In Proceedings of Cryptography and
Coding, volume 2260 of Lecture Notes in Computer
Science, pages 360–363. Springer-Verlag, 2001.
[10] V. Goyal, O. Pandeyy, A. Sahaiz, and B. Waters. Attribute-
Based Encryption for Fine-Grained Access Control of
Encrypted Data. In Proceedings of the 13th ACM
conference on Computer and communications security,
pages 89–98, 2006.
[11] D. Kahn. The Codebreakers, The Story of Secret Writing.
MacMillan, 1st edition, 1967.
[12] N. Smart. Cryptography: An Introduction. Mcgraw-Hill
College, 2004.
[13] B. Waters. Ciphertext-Policy Attribute-Based Encryption:
An Expressive, Efficient, and Provably Secure Realization.
Cryptology ePrint Archive, Report 2008/290, 2008.
http://eprint.iacr.org/.
[14] M. Myers. Revocation: Options and Challenges. In
Financial Cryptography, volume 1465 of Lecture Notes in
Computer Science, pages 165–171. Springer-Verlag, 1998.
[15] Rafail Ostrovsky, Amit Sahai, and Brent Waters. Attributebased
encryption with non-monotonic access structures. In
Proceedings of the 14th ACM conference on Computer and
communications security, CCS ‘07, pages 195–203, New
York, NY, USA, 2007. ACM.
[16] Ling Cheung and Calvin Newport. Provably secure
ciphertext policy abe. In Proceedings of the 14th ACM
conference on Computer and communications security,
CCS ‘07, pages 456–465, New York, NY, USA, 2007.
ACM.
[17] John Bethencourt, Amit Sahai, and Brent Waters.
Ciphertext-policy attribute-based encryption. In IEEE
Symposium on Security and privacy, pages 321–334, 2007.
Keywords
Public Key Cryptography, Attribute
Based Encryption and Pairing Based Cryptography.