A Lightweight CP-ABE Scheme with Direct Attribute Revocation for Vehicular Ad Hoc Network

被引:0
|
作者
Liu, Yilong [1 ,2 ]
Xu, Shengwei [1 ,3 ]
Yue, Ziyan [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
[2] Beijing Elect Sci & Technol Inst, Dept Cyberspace Secur, Beijing 100070, Peoples R China
[3] Beijing Elect Sci & Technol Inst, Inst Informat Secur, Beijing 100070, Peoples R China
关键词
VANETs; CP-ABE; attribute direct revocation; scalar multiplication;
D O I
10.3390/e25070979
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) technology provides a new solution to address the security and fine-grained access control of traffic information in vehicular ad hoc networks (VANETs). However, in most CP-ABE schemes for VANETs, attribute revocation suffers from high system consumption and complex revocation operations, as well as from high computational overhead and low efficiency due to the use of bilinear pairwise operations. Based on this, this paper proposes a lightweight CP-ABE scheme that supports direct attribute revocation in VANETs. The scheme implements an agent-based direct attribute revocation mechanism by separating dynamic and static attributes of vehicle terminals, which reduces system consumption and simplifies the revocation operation process. The scheme uses scalar multiplication on elliptic curves instead of bilinear pairing operations and uses computational outsourcing techniques to reduce the terminal decryption cost and improve the efficiency of the scheme. The security and performance analysis shows that the overall efficiency of our scheme is better than the existing schemes under the premise of ensuring data confidentiality and integrity.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] Distributed Cryptography for Lightweight Encryption in Decentralized CP-ABE
    Kamel, Mohammed B. M.
    Van Oosterhout, Janneke
    Ligeti, Peter
    Reich, Christoph
    2023 19TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, WIMOB, 2023, : 476 - 480
  • [22] Lattice-Based CP-ABE Access Control for SDS Constraint with Lazy Assignment of Attributes and Attribute Revocation
    Guo, Ting
    Abduxkur, Abdugeni
    Helil, Nurmamat
    IET INFORMATION SECURITY, 2024, 2024
  • [23] A Lightweight Certificate Revocation Scheme for Hybrid Mobile ad Hoc Networks
    Xu, Huaqiang
    Wang, Rui
    Jia, Zhiping
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 287 - 302
  • [24] ESAR: Enhanced Secure Authentication and Revocation Scheme for Vehicular Ad Hoc Networks
    Coruh, Ugur
    Bayat, Oguz
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 64
  • [25] ESAR: Enhanced Secure Authentication and Revocation Scheme for Vehicular Ad Hoc Networks
    Coruh, Uğur
    Bayat, Oğuz
    Journal of Information Security and Applications, 2022, 64
  • [26] MACPABE: Multi-Authority-based CP-ABE with efficient attribute revocation for IoT-enabled healthcare infrastructure
    Das, Sangjukta
    Namasudra, Suyel
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2023, 33 (03)
  • [27] A traceable and verifiable CP-ABE scheme with blockchain in VANET
    Haijun Huang
    Hong Zhang
    Zidi Zhao
    Shouhua Zhang
    The Journal of Supercomputing, 2023, 79 : 16859 - 16883
  • [28] Efficient CP-ABE Attribute/Key Management for IoT Applications
    Touati, Lyes
    Challal, Yacine
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 343 - 350
  • [29] CP-ABE Scheme with Fast Decryption for Public Cloud
    Zou L.-P.
    Feng C.-S.
    Qin Z.-G.
    Yuan D.
    Luo W.-P.
    Li M.
    Ruan Jian Xue Bao/Journal of Software, 2020, 31 (06): : 1817 - 1828
  • [30] CP-ABE With Constant-Size Keys for Lightweight Devices
    Guo, Fuchun
    Mu, Yi
    Susilo, Willy
    Wong, Duncan S.
    Varadharajan, Vijay
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (05) : 763 - 771