Outsourcing Decryption of Attribute Based Encryption with Energy Efficiency

被引:4
|
作者
Wang, Xu An [1 ,2 ]
Ma, Jianfeng [2 ]
Xhafa, Fatos [3 ]
机构
[1] Engn Univ Chinese Armed Police Force, Xian, Peoples R China
[2] Xidian Univ, Sch Cyber Engn, Xian, Peoples R China
[3] Univ Politecn Cataluna, E-08028 Barcelona, Spain
关键词
Outsourcing; Decryption of ABE; Energy efficiency; Mobile phone; SECURE IBE;
D O I
10.1109/3PGCIC.2015.99
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a new efficient scheme to outsource the the decryption of attribute based encryption with energy efficiency. We observe all the previous work on outsourcing the decryption of ABE cares little about the ciphertext length. Almost all of them have linear length ciphertext with the attributes or the policy. But we know that transferring so long ciphertexts via wireless network for mobile phone can easily run out the energy of the battery, which hesitates the adaption of these solutions in actual scenarios. In this paper, we propose a new scheme to outsource the decryption of ABE but with constant size ciphertexts, which can achieve high energy efficiency. Compared with the pervious work on outsourcing the decryption of ABE, our work can achieve high energy efficiency and low bandwidth for the mobile phone users.
引用
收藏
页码:444 / 448
页数:5
相关论文
共 50 条
  • [21] Optimizing the decryption efficiency in LSSS matrix-based attribute-based encryption without given policy
    Liu, Meng-Jun
    Liu, Shu-Bo
    Wang, Ying
    Wang, Jing
    Li, Yong-Kai
    Cao, Hui
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2015, 43 (06): : 1065 - 1072
  • [22] Efficient Offline/Online Attribute Based Encryption with Verifiable Outsourced Decryption
    Zhao Zhiyuan
    Sun Lei
    Hu Jiafu
    Zhou Shie
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (12) : 2998 - 3006
  • [23] Improving Security in Multi Authority Attribute Based Encryption with Fast Decryption
    Gorasia, Nikita
    Srikanth, R. R.
    Doshi, Nishant
    Rupareliya, Jay
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 632 - 639
  • [24] Offline/online attribute-based encryption with verifiable outsourced decryption
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Huang, Xinyi
    Yiu, S. M.
    Sadakane, Kunihiko
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (07):
  • [25] Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption
    Zuo, Cong
    Shao, Jun
    Wei, Guiyi
    Xie, Mande
    Ji, Min
    INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 495 - 508
  • [26] Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption
    El Gafif, Hassan
    Toumanari, Ahmed
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [27] Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing
    Qin, Baodong
    Zheng, Dong
    IEEE ACCESS, 2019, 7 : 42331 - 42342
  • [28] Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length
    Li, Jiguo
    Sha, Fengjie
    Zhang, Yichen
    Huang, Xinyi
    Shen, Jian
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [29] Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption
    Mao, Xianping
    Lai, Junzuo
    Mei, Qixiang
    Chen, Kefei
    Weng, Jian
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (05) : 533 - 546
  • [30] Outsourcing the Decryption of Ciphertexts for Predicate Encryption via Pallier Paradigm
    Ping, Bai
    Wei, Zhang
    Li Zhenlin
    Wang, Xu An
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 199 - 211