ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2019, Vol. 56 ›› Issue (10): 2151-2159.doi: 10.7544/issn1000-1239.2019.20190343

Special Issue: 2019密码学与智能安全研究专题

Previous Articles     Next Articles

Effective CP-ABE with Hidden Access Policy

Wang Yue1,2, Fan Kai2   

  1. 1(School of Information Engineering, Xi’an University, Xi’an 710065);2(School of Cyber Engineering, Xidian University, Xi’an 710071)
  • Online:2019-10-16

Abstract: The development of artificial intelligence depends on the development of cloud computing, at the same time, the security of artificial intelligence is closely related to the security of large data in the cloud. At Present, the ciphertext policy attribute-based encryption (CP-ABE) scheme is considered to be one of the most effective methods to achieve fine-grained access control of data in cloud. In the CP-ABE scheme, the access policy is often associated with the ciphertext. But sometimes, the access policy itself is also the important sensitive information, and access policies stored in the cloud in the form of clear text will also cause the users’ data revealed. In response to this problem, an efficient improved CP-ABE scheme is presented, which can hide the access policy. It can make both the attribute hiding and the secret sharing be applied to the AND-gate structure at the same time and then according to the composite order bilinear groups. Therefore, the user’s specific attribute value will not be disclosed to any other third party, thus we effectively protect the user’s privacy. In addition, through the experimental verification and data analysis, our scheme not only achieves the hidden of complex access structure,but also makes the ciphertext time shortened and decryption efficiency improved.

Key words: security of large data, attribute based encryption (ABE), access structure, hidden policy, access control

CLC Number: