Abstract:As sensitive data is stored and shared by third party sites on the Internet, there will be a need to encrypt data stored at these sites. Attribute Based Encryption (ABE) schemes is a vision of public key encryption mechanism that allows users to encrypt and decrypt messages based on user attributes. ABE takes attributes as public key and associates them with the ciphertext and user's secret key. It is an efficient way to solve open problems in access control scenarios. In this paper, we survey the basic Attribute Based Encryption (ABE) scheme and its two varients: Key-policy ABE (KP-ABE) scheme and the Ciphertext-policy ABE (CP-ABE) scheme.
Keywords: Attribute Based Encryption, Key-policy, Ciphertext-policy, data sharing, security
[1]. A. Sahai and B. Waters, ―Fuzzy identity-based encryption,‖ inProc.EUROCRYPT, 2005, pp. 457473.
[2]. V. Goyal, O. Pandey, A. Sahai, and B. Waters, ―Attribute based encryption for fine-grained access control of encrypted data,‖ in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06), pp. 89–98, November 2006.
[3]. J. Bethencourt, A. Sahai, and B. Waters, ―Ciphertext-policy attribute-based encryption,‖ in Proceedings of the IEEE Symposium on Security and Privacy (SP '07), pp. 321–334,May 2007. 4) R. Ostrovsky, A. Sahai, and B.Waters, ―Attribute-based encryption with non-monotonic access structures,‖ in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 195–203, November 2007.
[4]. N. Attrapadung, B. Libert, and E. de Panafieu, ―Expressive keypolicy attribute-based encryption with constant-size ciphertexts,‖ in Public Key Cryptography—PKC 2011, vol. 6571, pp. 90– 108, Springer, 2011.
[5]. V. Goyal, A. Jain, O. Pandey, and A. Sahai, ―Bounded ciphertext policy attribute based encryption,‖ in Automata, Languages and Programming: Part II, vol. 5126 of Lecture Notes in Computer Science, pp. 579–591, Springer, Berlin, Germany, 2008.
[6]. L. Cheung and C. Newport, ―Provably secure ciphertext policy ABE,‖ in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 456–465,November 2007.