Efficient and Secure Ciphertext-Policy Attribute-Based Encryption Without Pairing for Cloud-Assisted Smart Grid

被引:22
|
作者
Wang, Yong [1 ]
Chen, Biwen [2 ]
Li, Lei [1 ]
Ma, Qiang [1 ]
Li, Huicong [1 ]
He, Debiao [3 ]
机构
[1] State Grid Shandong Elect Power Co, Jinan 250001, Peoples R China
[2] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Peoples R China
[3] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption; Smart grids; Access control; Cloud computing; Elliptic curves; Cloud-assisted smart grid; access control; ciphertext-policy attribute-based encryption; pairing-free; INTERNET; REVOCATION;
D O I
10.1109/ACCESS.2020.2976746
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud-assisted smart grid has been broadly deployed to improve the economics, efficiency, sustainability, and reliability of electricity services. The new revolution of technology will also bring new challenges to data security, particularly data confidentiality. As a promising encryption method for supporting fine-grained access control, attribute-based encryption (ABE) is widely given attention by the academia and industry. However, most existing schemes suffer from the efficiency problem limiting its deployment for the cloud-assisted smart grid, especially for resource-limited users. To address this problem, this paper proposes two efficient pairing-free ciphertext-policy attribute-based schemes that eliminate the computation-intensive bilinear pairing operation. The basic scheme only uses some simple scalar multiplications based on elliptic curves, and the enhanced scheme provides an important usability feature, namely the users and attributes revocation. The security of the proposed schemes is reduced to the elliptic curve decisional Diffie-Hellman problem. Finally, the performance analysis and extensive experiments demonstrate that our proposed schemes are suitable for the cloud-assisted smart grid.
引用
收藏
页码:40704 / 40713
页数:10
相关论文
共 50 条
  • [31] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Hao Wang
    Debiao He
    Jian Shen
    Zhihua Zheng
    Chuan Zhao
    Minghao Zhao
    Soft Computing, 2017, 21 : 7325 - 7335
  • [32] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Wang, Hao
    He, Debiao
    Shen, Jian
    Zheng, Zhihua
    Zhao, Chuan
    Zhao, Minghao
    SOFT COMPUTING, 2017, 21 (24) : 7325 - 7335
  • [33] Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption
    El Gafif, Hassan
    Toumanari, Ahmed
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [34] Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health
    Wang, Huiyong
    Liang, Jialing
    Ding, Yong
    Tang, Shijie
    Wang, Yujue
    COMPUTER STANDARDS & INTERFACES, 2023, 84
  • [35] Large Universe Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation
    Sun, Lei
    Wang, Shuaili
    Li, Zuohui
    Wang, Guangbo
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, AUTOMATION AND MECHANICAL ENGINEERING (EAME 2017), 2017, 86 : 243 - 249
  • [36] Server Aided Ciphertext-Policy Attribute-Based Encryption
    Wang, Hao
    Yang, Bo
    Wang, Yilei
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 440 - 444
  • [37] Securely outsourcing the ciphertext-policy attribute-based encryption
    Kim Thuat Nguyen
    Oualha, Nouha
    Laurent, Maryline
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01): : 169 - 183
  • [38] GPU Acceleration of Ciphertext-Policy Attribute-Based Encryption
    Fan, Kai
    Zhang, Chaoyu
    Shan, Ruiwen
    Yu, Hexuan
    Jiang, Hai
    2019 20TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2019, : 94 - 101
  • [39] An Improved Ciphertext-Policy Attribute-Based Encryption Scheme
    Zheng, Hua
    Zhang, Xi
    Yang, Qi
    SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 400 - 411
  • [40] Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme
    Asim, Muhammad
    Ibraimi, Luan
    Petkovic, Milan
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 244 - +