weighted attribute, which computed the result of the
sub-tree corresponding to that attribute. Our results
can be see in Figure 1.
5 CONCLUSIONS
While this approach is most likely not the most effi-
cient for Weighted ABE systems, it is not far away
from the best existing solution in terms of efficiency.
However, our variant provides a more simpler
and proven secure mathematical construction, which
lead to more versatility, inheriting all possible en-
hancements of the emblematic KP-ABE (Goyal et al.,
2006) and CP-ABE (Bethencourt et al., 2007) sys-
tems, such as: access revocation, outsourcing and
multi-authority.
On top of that, this Weighted ABE system proves
to be very suitable for parallelized decryption, in or-
der to make it more efficient: It is both easy to imple-
ment and offers great practical time benefit, without
any mathematical alteration of the system.
The performance tests show that this simple ap-
proach is suitable for practical use. While for the nor-
mal version we could use access policies up to 40-
50 attributes, for the parallel one, this number will
greatly increase to around 100.
REFERENCES
Asim, M., Petkovic, M., and Ignatenko, T. (2014).
Attribute-based encryption with encryption and de-
cryption outsourcing.
Attrapadung, N., Hanaoka, G., Ogawa, K., Ohtake, G.,
Watanabe, H., and Yamada, S. (2018). Attribute-
based encryption for range attributes. IEICE Trans-
actions on Fundamentals of Electronics, Communica-
tions and Computer Sciences, 101(9):1440–1455.
Beimel, A. (2011). Secret-sharing schemes: a survey. In
International conference on coding and cryptology,
pages 11–46. Springer.
Bethencourt, J., Sahai, A., and Waters, B. (2007).
Ciphertext-policy attribute-based encryption. In 2007
IEEE symposium on security and privacy (SP’07),
pages 321–334. IEEE.
Chase, M. (2007). Multi-authority attribute based encryp-
tion. In Theory of Cryptography Conference, pages
515–534. Springer.
Goyal, V., Pandey, O., Sahai, A., and Waters, B. (2006).
Attribute-based encryption for fine-grained access
control of encrypted data. In Proceedings of the 13th
ACM conference on Computer and communications
security, pages 89–98.
Hu, P. and Gao, H. (2017). Ciphertext-policy attribute-
based encryption for general circuits from bilinear
maps. Wuhan University Journal of Natural Sciences,
22(2):171–177.
Li, H., Yu, K., Liu, B., Feng, C., Qin, Z., and Srivastava,
G. (2021). An efficient ciphertext-policy weighted
attribute-based encryption for the internet of health
things. IEEE Journal of Biomedical and Health In-
formatics.
Liu, X., Zhu, H., Ma, J., Ma, J., and Ma, S. (2014).
Key-policy weighted attribute based encryption for
fine-grained access control. In 2014 IEEE Inter-
national Conference on Communications Workshops
(ICC), pages 694–699. IEEE.
Ostrovsky, R., Sahai, A., and Waters, B. (2007). Attribute-
based encryption with non-monotonic access struc-
tures. In Proceedings of the 14th ACM conference on
Computer and communications security, pages 195–
203.
Qian, H., Li, J., Zhang, Y., and Han, J. (2015).
Privacy-preserving personal health record using
multi-authority attribute-based encryption with revo-
cation. International Journal of Information Security,
14(6):487–497.
Sahai, A. and Waters, B. (2005). Fuzzy identity-based en-
cryption. In EuroCrypt, pages 457–473. Springer.
Shamir, A. (1984). Identity-based cryptosystems and sig-
nature schemes. In Workshop on the theory and ap-
plication of cryptographic techniques, pages 47–53.
Springer.
¸Tiplea, F. L. and Dr
˘
agan, C. C. (2014). Key-policy attribute-
based encryption for boolean circuits from bilinear
maps. In BalkanCryptSec, pages 175–193. Springer.
Tiplea, F. L., Ionita, A., and Nica, A.-M. (2020). Practi-
cally efficient attribute-based encryption for compart-
mented access structures. In ICETE (2), pages 201–
212.
Wang, S., Liang, K., Liu, J. K., Chen, J., Yu, J., and Xie, W.
(2016). Attribute-based data sharing scheme revisited
in cloud computing. IEEE Transactions on Informa-
tion Forensics and Security, 11(8):1661–1673.
Waters, B. (2011). Ciphertext-policy attribute-based en-
cryption: An expressive, efficient, and provably se-
cure realization. In International Workshop on Public
Key Cryptography, pages 53–70. Springer.
Xue, K., Hong, J., Xue, Y., Wei, D. S., Yu, N., and
Hong, P. (2017). Cabe: A new comparable attribute-
based encryption construction with 0-encoding and
1-encoding. IEEE Transactions on Computers,
66(9):1491–1503.
Weighted Attribute-based Encryption with Parallelized Decryption
579