About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
ChinaCom2009-Network and Information Security Symposium

Research Article

Enhancing Attribute-Based Encryption with Attribute Hierarchy

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/CHINACOM.2009.5339938,
        author={Jin Li and Qian Wang and Cong Wang and Kui Ren},
        title={Enhancing Attribute-Based Encryption with Attribute Hierarchy},
        proceedings={ChinaCom2009-Network and Information Security Symposium},
        publisher={IEEE},
        proceedings_a={CHINACOM2009-NIS},
        year={2009},
        month={11},
        keywords={Attribute-Based Hierarchy Encryption Access Control Pairing},
        doi={10.1109/CHINACOM.2009.5339938}
    }
    
  • Jin Li
    Qian Wang
    Cong Wang
    Kui Ren
    Year: 2009
    Enhancing Attribute-Based Encryption with Attribute Hierarchy
    CHINACOM2009-NIS
    IEEE
    DOI: 10.1109/CHINACOM.2009.5339938
Jin Li1,*, Qian Wang1,*, Cong Wang1,*, Kui Ren1,*
  • 1: Department of ECE, Illinois Institute of Technology
*Contact email: jin.li@ece.iit.edu, qwang@ece.iit.edu, cwang@ece.iit.edu, kren@ece.wpi.edu

Abstract

Attribute-based encryption (ABE) has been envisioned as a promising cryptographic primitive for realizing secure and flexible access control. However, ABE is being criticized for its high scheme overhead as extensive pairing operations are usually required. In this paper, we focus on improving the efficiency of ABE by leveraging a previously overlooked fact, i.e., the often-found hierarchical relationships among the attributes that are inherent to many access control scenarios. As the first research effort along this direction, we coin the notion of hierarchical ABE (HABE), which can be viewed as the generalization of traditional ABE in the sense that both definitions are equal when all attributes are independent. We further give a concrete HABE construction considering a tree hierarchy among the attributes, which is provably secure. More importantly, our construction exhibits significant improvements over the traditional ABE when attribute hierarchies exist.

Keywords
Attribute-Based Hierarchy Encryption Access Control Pairing
Published
2009-11-20
Publisher
IEEE
Modified
2010-05-16
http://dx.doi.org/10.1109/CHINACOM.2009.5339938
Copyright © 2009–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL