GPU Acceleration of Ciphertext-Policy Attribute-Based Encryption

被引:0
|
作者
Fan, Kai [1 ]
Zhang, Chaoyu [1 ]
Shan, Ruiwen [1 ]
Yu, Hexuan [1 ]
Jiang, Hai [1 ]
机构
[1] Arkansas State Univ, Dept Comp Sci, State Univ, AR 72467 USA
关键词
GPU; CP-ABE; Security; Performance; Parallel;
D O I
10.1109/snpd.2019.8935702
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the development of cloud computing, data security became popular in recent decades. However, traditional cryptography has some major limitations. For example, public key cryptography is not scalable in cases with many clients. Since Ciphertext-Policy Attribute-based encryption (CP-ABE) was developed in 2007, it has become as one of the major candidates to implement secure cloud storage. However, CP-ABE still cannot play a solid role due to its several limitations such as complexity of computation, lack efficiency revocation function, etc. This paper will review the CP-ABE and analyze the current CP-ABE toolkit. Major performance bottleneck will be identified and parallelized in CUDA. CP-ABE toolkit will be partially ported to GPU platform for acceleration. Some experiments have been conducted to demonstrate the effectiveness of the proposed approach.
引用
收藏
页码:94 / 101
页数:8
相关论文
共 50 条
  • [1] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [2] Ciphertext-policy attribute-based delay encryption
    Chen, Lijiao
    Lv, Kewei
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (02)
  • [3] Server Aided Ciphertext-Policy Attribute-Based Encryption
    Wang, Hao
    Yang, Bo
    Wang, Yilei
    [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 440 - 444
  • [4] Securely outsourcing the ciphertext-policy attribute-based encryption
    Kim Thuat Nguyen
    Oualha, Nouha
    Laurent, Maryline
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01): : 169 - 183
  • [5] Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme
    Asim, Muhammad
    Ibraimi, Luan
    Petkovic, Milan
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 244 - +
  • [6] An Improved Ciphertext-Policy Attribute-Based Encryption Scheme
    Zheng, Hua
    Zhang, Xi
    Yang, Qi
    [J]. SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 400 - 411
  • [7] Securely outsourcing the ciphertext-policy attribute-based encryption
    Kim Thuat Nguyen
    Nouha Oualha
    Maryline Laurent
    [J]. World Wide Web, 2018, 21 : 169 - 183
  • [8] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    Xu Peng
    Tang Yong
    Jiang Wenbin
    Jin Hai
    Zou Deqing
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 655 - 660
  • [9] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    XU Peng
    TANG Yong
    JIANG Wenbin
    JIN Hai
    ZOU Deqing
    [J]. Chinese Journal of Electronics, 2014, 23 (04) : 655 - 660
  • [10] Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    [J]. SENSORS, 2019, 19 (07)