Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption

被引:4
|
作者
El Gafif, Hassan [1 ]
Toumanari, Ahmed [1 ]
机构
[1] Natl Sch Appl Sci ENSA, Lab Appl Math & Intelligent Syst Engn MAISI, Agadir 80999, Morocco
关键词
This work was supported by the National Center for Scientific and Technical Research (CNRST) (scholarship number: 4UIZ2017);
D O I
10.1155/2021/8834616
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The invention of the Ciphertext-Policy Attribute-Based Encryption scheme opened a new perspective for realizing attribute-based access control systems without being forced to trust the storage service provider, which is the case in traditional systems where data are sent to the storage service provider in clear and the storage service provider is the party that controls the access to these data. In the Ciphertext-Policy Attribute-Based Encryption model, the data owner encrypts data using an attribute-based access structure before sending them to the storage service, and only users with authorized sets of attributes can successfully decrypt the generated ciphertext. However, Ciphertext-Policy Attribute-Based Encryption schemes employ expensive operations (i.e., bilinear pairings and modular exponentiations) and generate long ciphertexts and secret keys, which makes them hard to implement in real-life applications especially for resource-constrained devices. In this paper, we propose two Ciphertext-Policy Attribute-Based Encryption Key Encapsulation Mechanisms that can be provided as services in the cloud, minimizing the user's encryption and decryption costs without exposing any sensitive information to the public cloud provider. In the first scheme, the ABE Service Provider is considered fully untrusted. On the other hand, the second scheme requires the ABE Service Provider to be semi-trusted (Honest-but-Curious) and does not collude with illegitimate users. Both schemes are proved to be selectively CPA-secure in the random oracle. The theoretical and experimental performance results show that both our first and second schemes are more efficient than the reviewed outsourced CP-ABE schemes in terms of user-side computation, communication, and storage costs.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud
    Li, Qi
    Zhu, Hongbo
    Ying, Zuobin
    Zhang, Tao
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [2] Outsourced ciphertext-policy attribute-based encryption with partial policy hidden
    Yu, Jinxia
    He, Guanghui
    Yan, Xixi
    Tang, Yongli
    Qin, Rongxia
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (05)
  • [3] Novel Constructions for Ciphertext-Policy Attribute-Based Searchable Encryption
    Brigitthe Hinojosa-Cabello, Melissa
    Morales-Sandoval, Miguel
    Marin-Castro, Heidy M.
    [J]. 2022 IEEE MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE (ENC), 2022,
  • [4] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [5] Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption
    Rao, Y. Sreenivasa
    Dutta, Ratna
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2013, 2013, 8099 : 66 - 81
  • [6] An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Collaborative Decryption With Blockchain
    He, Ying
    Wang, Haiyan
    Li, Yuan
    Huang, Ke
    Leung, Victor C. M.
    Yu, F. Richard
    Ming, Zhong
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) : 2722 - 2733
  • [7] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Wang, Hao
    He, Debiao
    Shen, Jian
    Zheng, Zhihua
    Zhao, Chuan
    Zhao, Minghao
    [J]. SOFT COMPUTING, 2017, 21 (24) : 7325 - 7335
  • [8] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Hao Wang
    Debiao He
    Jian Shen
    Zhihua Zheng
    Chuan Zhao
    Minghao Zhao
    [J]. Soft Computing, 2017, 21 : 7325 - 7335
  • [9] Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption
    Mao, Xianping
    Lai, Junzuo
    Mei, Qixiang
    Chen, Kefei
    Weng, Jian
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (05) : 533 - 546
  • [10] A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption
    Malluhi, Qutaibah M.
    Shikfa, Abdullatif
    Viet Cuong Trinh
    [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 230 - 240