Adaptively secure multi-authority attribute-based broadcast encryption in fog computing

被引:2
|
作者
Chen, Jie [1 ]
Niu, Jiaxu [1 ]
Lei, Hao [2 ]
Lin, Li [2 ]
Ling, Yunhao [1 ]
机构
[1] East China Normal Univ, Sch Software Engn, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] Ant Grp, Hangzhou 310023, Peoples R China
基金
中国国家自然科学基金;
关键词
Attributed-based broadcast encryption; Fog computing; Multi-authority; Adaptively secure; DUAL SYSTEM ENCRYPTION; INTERNET; HIBE;
D O I
10.1016/j.comnet.2023.109844
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is considered an important development in cloud computing, with shorter response times, less data transfer load and a more secure distributed service architecture that can be accessed by a wide range of end devices. As with cloud computing, it also faces the challenge of how to securely distribute sensitive data. Ciphertext-Policy Attribute-based Broadcast Encryption (CP-ABBE) can protect sensitive data and provide fine-grained access control with user revocation. However, existing CP-ABBE schemes suffer many limitations when implemented in a fog computing environment: a single authority performs poorly in handling requests or data from many IoT devices, leading to system delays or limited functionality; expensive decryption costs make the computation and storage overheads unfriendly to devices with limited resources; these schemes are only proven selectively secure, meaning that security was proven in a weaker model. In this paper, using threshold secret sharing and decryption delegation, we propose an adaptively secure attribute-based multi-authority broadcast encryption (MA-ABBE) scheme that breaks through these limitations. The comparison and analysis results show that our scheme is practical and achieves adaptive security, enables user-side fast decryption and low storage overhead, and provides a secure and efficient option for protecting sensitive data in fog computing environments.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
    Kai ZHANG
    Jianfeng MA
    Jiajia LIU
    Hui LI
    [J]. Science China(Information Sciences), 2016, 59 (09) : 256 - 258
  • [2] Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
    Zhang, Kai
    Ma, Jianfeng
    Liu, Jiajia
    Li, Hui
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (09)
  • [3] Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
    Kai Zhang
    Jianfeng Ma
    Jiajia Liu
    Hui Li
    [J]. Science China Information Sciences, 2016, 59
  • [4] A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing
    Tu, Shanshan
    Waqas, Muhammad
    Huang, Fengming
    Abbas, Ghulam
    Abbas, Ziaul Haq
    [J]. COMPUTER NETWORKS, 2021, 195
  • [5] TRACEABLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD COMPUTING
    Yang, Xiaodong
    Yang, Ping
    An, Faying
    Zhou, Qixu
    Yang, Miaomiao
    [J]. 2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 263 - 267
  • [6] Secure and Efficient Multi-Authority Attribute-Based Encryption Scheme From Lattices
    Liu, Yuan
    Wang, Licheng
    Li, Lixiang
    Yan, Xixi
    [J]. IEEE ACCESS, 2019, 7 : 3665 - 3674
  • [7] A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy
    Qi, Fang
    Li, Ke
    Tang, Zhe
    [J]. 2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 607 - 613
  • [8] A survey on multi-authority and decentralized attribute-based encryption
    Prince Silas Kwesi Oberko
    Victor-Hillary Kofi Setornyo Obeng
    Hu Xiong
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 515 - 533
  • [9] Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation
    Xu, Qian
    Tan, Chengxiang
    Fan, Zhijie
    Zhu, Wenye
    Xiao, Ya
    Cheng, Fujia
    [J]. SENSORS, 2018, 18 (05)
  • [10] A survey on multi-authority and decentralized attribute-based encryption
    Oberko, Prince Silas Kwesi
    Obeng, Victor-Hillary Kofi Setornyo
    Xiong, Hu
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (01) : 515 - 533