A secure multi-authority attribute based encryption approach for robust smart grids

被引:0
|
作者
Saidi, Ahmed [1 ,2 ]
Amira, Abdelouahab [1 ]
Nouali, Omar [1 ]
机构
[1] Res Ctr Sci & Tech Informat CERIST, DSI, Ben Aknoun, Algeria
[2] Res Ctr Sci & Tech Informat CERIST, DSI, Ben Aknoun 16000, Algiers, Algeria
来源
关键词
attribute based encryption; hidden policy; multi-authority; outsourcing; security; smart grids; EFFICIENT;
D O I
10.1002/cpe.7972
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents EMBASS, an Enhanced Multi-Authority Attribute-Based Encryption System for Smart Grids. EMBASS supports outsourced decryption to devices with limited resources. It also uses a proxy to add fake values to the access policy in order to protect against malicious users. Additionally, a proxy user assistant is utilized to create an intermediate key for each fog node in the decryption process, and a chain decryption technique is used to further delegate the decryption process. The security properties and performance of the proposed system are analyzed, discussed and compared to state of the art approaches. EMBASS has been discussed for usage with smart grids, and experimentation shows that it yields promising results compared to state-of-the-art approaches.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Multi-authority attribute based encryption
    Chase, Melissa
    [J]. Theory of Cryptography, Proceedings, 2007, 4392 : 515 - 534
  • [2] Multi-authority Attribute Based Encryption Scheme with Revocation
    Huang, XiaoFang
    Tao, Qi
    Qin, BaoDong
    Liu, ZhiQin
    [J]. 24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015, 2015,
  • [3] Secure and Efficient Multi-Authority Attribute-Based Encryption Scheme From Lattices
    Liu, Yuan
    Wang, Licheng
    Li, Lixiang
    Yan, Xixi
    [J]. IEEE ACCESS, 2019, 7 : 3665 - 3674
  • [4] Adaptively secure multi-authority attribute-based broadcast encryption in fog computing
    Chen, Jie
    Niu, Jiaxu
    Lei, Hao
    Lin, Li
    Ling, Yunhao
    [J]. COMPUTER NETWORKS, 2023, 232
  • [5] Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
    Kai ZHANG
    Jianfeng MA
    Jiajia LIU
    Hui LI
    [J]. Science China(Information Sciences), 2016, 59 (09) : 256 - 258
  • [6] Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
    Zhang, Kai
    Ma, Jianfeng
    Liu, Jiajia
    Li, Hui
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (09)
  • [7] Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
    Kai Zhang
    Jianfeng Ma
    Jiajia Liu
    Hui Li
    [J]. Science China Information Sciences, 2016, 59
  • [8] A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy
    Qi, Fang
    Li, Ke
    Tang, Zhe
    [J]. 2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 607 - 613
  • [9] Accountable multi-authority attribute-based data access control in smart grids
    Zhang, Leyou
    Yang, Guang
    Song, Chao
    Wu, Qing
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (07)
  • [10] A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records
    Pussewalage, Harsha S. Gardiyawasam
    Oleshchuk, Vladimir A.
    [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 255 - 262