An Expressive Hidden Access Policy CP-ABE

Fawad Khan, Hui Li, Liangxuan Zhang, Jian Shen

Research output: Chapter in Book/Report/Conference proceedingConference proceedingpeer-review

26 Citations (Scopus)


Ciphertext Policy - Attribute Based Encryption (CPABE) has emerged as a feasible solution to address challenges of access control to a diverse set of users. In CP-ABE, owner encrypts its data under a policy of attributes, while any data consumer satisfying it can decrypt the data. Problem of existing CP-ABE schemes is that the access matrix is sent in plaintext along with the ciphertext. Hence, to provide legitimate consumers with capability to figure out their exact attributes satisfying policy; we trade-off the privacy of policy. Existing work focuses on hiding the attribute values, and most of them are based on less expressive And-based access structures. A policy can be considered as hidden, when both attribute's names and their corresponding combination cannot be revealed. To do so, we propose a novel idea of not sending the access matrix along with ciphertext. Moreover, to aid consumer in finding out the subset of his attributes satisfying policy, we exploit Hidden Vector Encryption (HVE) for subset condition checks. We give performance analysis of our scheme in Charm Simulator, and prove it to be selectively secure under DBDH and DLIN assumptions
Original languageEnglish
Title of host publication2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)
Number of pages9
ISBN (Electronic)9781538616000
ISBN (Print)978-1-5386-1601-7
Publication statusE-pub ahead of print - 10 Aug 2017
Externally publishedYes
Event2017 IEEE Second International Conference on Data Science in Cyberspace - Shenzhen, China
Duration: 26 Jun 201729 Jun 2017


Conference2017 IEEE Second International Conference on Data Science in Cyberspace
Abbreviated titleDSC


  • Hidden access policy
  • privacy preservation
  • LSSS
  • CP-ABE


Dive into the research topics of 'An Expressive Hidden Access Policy CP-ABE'. Together they form a unique fingerprint.

Cite this