A Partial Outsourcing Decryption of Attribute-Based Encryption for Internet of Things

被引:0
|
作者
Kumar, Dilip [1 ]
Kumar, Manoj [1 ]
机构
[1] Babasaheb Bhimaro Ambedkar Univ, Lucknow, Uttar Pradesh, India
关键词
IoT; Attribute-based encryption; CP-ABE; Bilinear pairing; Secret sharing; CONSTANT-SIZE KEYS; CP-ABE; LIGHTWEIGHT; SCHEME;
D O I
10.1007/978-981-16-6887-6_22
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet of things (IoT) is a fast-growing technology in the modern digital era that attracts people from industries as well as academic fields. IoT provides the platform to connect all the devices to share data over the Internet. This emerging technology suffers from many security issues due to the heterogeneity of the environment and resource-constrained IoT devices. Attribute-based encryption (ABE) is a modern encryption scheme that provides security along with an access control mechanism. This technique is applied for secure communication among IoT devices over unsecured communication channels. The bilinear pairing operation is generally used for encryption and established sharing between parties. In this paper, outsourcing-based decryption of ABE using a three-party Diffie-Hellman key exchange protocol is proposed for the IoT environment where devices have limited computational and battery power. The main aim of the proposed scheme is to lessen the complexity of computation for the decryption operation of ABE for the resource-constrained devices of IoT.
引用
收藏
页码:271 / 281
页数:11
相关论文
共 50 条
  • [1] Attribute-Based Online/Offline Encryption with Outsourcing Decryption
    Wang, Zhan-Jun
    Ma, Hai-Ying
    Wang, Jin-Hua
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (06) : 1595 - 1611
  • [2] Attribute-based encryption scheme supporting attribute revocation and decryption outsourcing
    School of Mathematics and Statistics, Xidian Univ., Xi'an
    710071, China
    [J]. Xi'an Dianzi Keji Daxue Xuebao, 6 (6-10 and 55):
  • [3] Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Yiu, S. M.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 108 : 112 - 123
  • [4] Lightweight Attribute-based Encryption for the Internet of Things
    Oualha, Nouha
    Kim Thuat Nguyen
    [J]. 2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [5] A survey on attribute-based encryption for internet of things
    Kumar, Dilip
    Kumar, Manoj
    Gupta, Gaurav
    [J]. INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2023, 14 (02)
  • [6] Application of Attribute-based Encryption in Internet of Things
    Wang, Zixuan
    Liu, Hao
    Ma, Hao
    [J]. PROCEEDINGS OF THE 2018 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION AND INFORMATION (MEICI 2018), 2018, 163 : 180 - 183
  • [7] Attribute-based encryption scheme supporting decryption outsourcing and attribute revocation in cloud storage
    Liu, Hongwei
    Zhu, Ping
    Chen, Zehong
    Zhang, Peng
    Jiang, Zoe L.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 556 - 561
  • [8] A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks
    Wang, Qihua
    Yu, Chang Wu
    Li, Fagen
    Wang, Huaqun
    Cao, Lijie
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4138 - 4150
  • [9] Attribute-Based Encryption with Fast Decryption
    Hohenberger, Susan
    Waters, Brent
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 162 - 179
  • [10] A lightweight attribute-based encryption scheme for the Internet of Things
    Yao, Xuanxia
    Chen, Zhi
    Tian, Ye
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 49 : 104 - 112