Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing

被引:101
|
作者
Xiong, Hu [1 ]
Zhao, Yanan [1 ]
Peng, Li [1 ]
Zhang, Hao [1 ]
Yeh, Kuo-Hui [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Sichuan, Peoples R China
[2] Natl Dong Hwa Univ, Dept Informat Management, Hualien 97401, Taiwan
关键词
Edge computing; Attribute-based encryption; Direct revocation; Partially hidden policy; Outsourced encryption;
D O I
10.1016/j.future.2019.03.008
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The rapid growth of data has successfully promoted the development of edge computing, which is used for processing the data at the edge of network. The emergence of edge computing compensates for the network delay caused by massive data uploads to the cloud. However, the issues of data security and privacy protection still need to be resolved. In this paper, we propose an efficient ciphertext-policy attribute-based encryption (CP-ABE) scheme that for the first time simultaneously achieves partially hidden policy, direct revocation, and verifiable outsourced decryption. Specifically, in our scheme, the concept of partially hidden policy is introduced to protect private information in an access policy. In addition, after a revocation is successfully executed, the revoked users will not be able to access the message without affecting any other non-revoked users. Our new scheme leverages the outsourcing technique to minimize the overhead required of the user. We demonstrate that our scheme is secure under the Decisional (q - 1) Diffie-Hellman assumption and the Decisional Bilinear Diffie-Hellman assumption, as well as evaluating its performance using simulations. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:453 / 461
页数:9
相关论文
共 50 条
  • [1] An Expressive Fully Policy-Hidden Ciphertext Policy Attribute-Based Encryption Scheme With Credible Verification Based on Blockchain
    Zhang, Zhaoqian
    Zhang, Jianbiao
    Yuan, Yilin
    Li, Zheng
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) : 8681 - 8692
  • [2] Secure access privilege delegation using attribute-based encryption
    Suryakanta Panda
    Samrat Mondal
    Ashok Kumar Das
    Willy Susilo
    [J]. International Journal of Information Security, 2023, 22 : 1261 - 1276
  • [3] Secure access privilege delegation using attribute-based encryption
    Panda, Suryakanta
    Mondal, Samrat
    Das, Ashok Kumar
    Susilo, Willy
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1261 - 1276
  • [4] Adaptively secure multi-authority attribute-based broadcast encryption in fog computing
    Chen, Jie
    Niu, Jiaxu
    Lei, Hao
    Lin, Li
    Ling, Yunhao
    [J]. COMPUTER NETWORKS, 2023, 232
  • [5] Secure personal data sharing in cloud computing using attribute-based broadcast encryption
    FU Jingyi
    HUANG Qinlong
    MA Zhaofeng
    YANG Yixian
    [J]. TheJournalofChinaUniversitiesofPostsandTelecommunications., 2014, 21 (06) - 51+77
  • [6] Secure personal data sharing in cloud computing using attribute-based broadcast encryption
    FU Jing-yi
    HUANG Qin-long
    MA Zhao-feng
    YANG Yi-xian
    [J]. The Journal of China Universities of Posts and Telecommunications, 2014, (06) : 45 - 51
  • [7] Attribute-Based Encryption with Partially Hidden Ciphertext Policies
    Nishide, Takashi
    Yoneyama, Kazuki
    Ohta, Kazuo
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (01) : 22 - 32
  • [8] A Key-Policy Attribute-Based Broadcast Encryption
    Sun, Jin
    Hu, Yupu
    Zhang, Leyou
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (05) : 444 - 452
  • [9] Efficient Anonymous Attribute-Based Encryption with Access Policy Hidden for Cloud Computing
    Huang, Chanying
    Yan, Kedong
    Wei, Songjie
    Zhang, Gongxuan
    Lee, Dong Hoon
    [J]. PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC 2017), 2017, : 266 - 270
  • [10] Multi-Authority Attribute Based Encryption With Policy-hidden and Accountability
    Zhang, Wei
    Zhang, ZhiShuo
    Wu, Yi
    [J]. 2020 INTERNATIONAL CONFERENCE ON SPACE-AIR-GROUND COMPUTING (SAGC 2020), 2020, : 95 - 96