Outsourcing Decryption of Attribute Based Encryption with Energy Efficiency

被引:4
|
作者
Wang, Xu An [1 ,2 ]
Ma, Jianfeng [2 ]
Xhafa, Fatos [3 ]
机构
[1] Engn Univ Chinese Armed Police Force, Xian, Peoples R China
[2] Xidian Univ, Sch Cyber Engn, Xian, Peoples R China
[3] Univ Politecn Cataluna, E-08028 Barcelona, Spain
关键词
Outsourcing; Decryption of ABE; Energy efficiency; Mobile phone; SECURE IBE;
D O I
10.1109/3PGCIC.2015.99
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a new efficient scheme to outsource the the decryption of attribute based encryption with energy efficiency. We observe all the previous work on outsourcing the decryption of ABE cares little about the ciphertext length. Almost all of them have linear length ciphertext with the attributes or the policy. But we know that transferring so long ciphertexts via wireless network for mobile phone can easily run out the energy of the battery, which hesitates the adaption of these solutions in actual scenarios. In this paper, we propose a new scheme to outsource the decryption of ABE but with constant size ciphertexts, which can achieve high energy efficiency. Compared with the pervious work on outsourcing the decryption of ABE, our work can achieve high energy efficiency and low bandwidth for the mobile phone users.
引用
收藏
页码:444 / 448
页数:5
相关论文
共 50 条
  • [31] Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV
    Feng, Chaosheng
    Yu, Keping
    Aloqaily, Moayad
    Alazab, Mamoun
    Lv, Zhihan
    Mumtaz, Shahid
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (11) : 13784 - 13795
  • [32] Traceable Ciphertet-Policy Attribute-Based Encryption with Constant Decryption
    Wang, Guangbo
    Li, Feng
    Wang, Pengcheng
    Hu, Yixiao
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (09): : 3401 - 3420
  • [33] Attribute Based Encryption with Direct Efficiency Tradeoff
    Attrapadung, Nuttapong
    Hanaoka, Goichiro
    Matsumoto, Tsutomu
    Teruya, Tadanori
    Yamada, Shota
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 249 - 266
  • [34] Securely outsourcing the ciphertext-policy attribute-based encryption
    Kim Thuat Nguyen
    Oualha, Nouha
    Laurent, Maryline
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01): : 169 - 183
  • [35] Securely outsourcing the ciphertext-policy attribute-based encryption
    Kim Thuat Nguyen
    Nouha Oualha
    Maryline Laurent
    World Wide Web, 2018, 21 : 169 - 183
  • [36] Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption
    Zhu, Shuaishuai
    Han, Yiliang
    Wei, Yuechuan
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 257 - 261
  • [37] Outsourcing Attribute-Based Encryption to Enhance IoT Security and Performance
    Taha, Mohammad Bany
    Khasawneh, Fawaz A.
    Quttoum, Ahmad Nahar
    Alshammari, Muteb
    Alomari, Zakaria
    IEEE Access, 2024, 12 : 166800 - 166813
  • [38] A Multi-authority Attribute-based Encryption Scheme with Pre-decryption
    Chen, Danwei
    Wan, Liangqing
    Wang, Chen
    Pan, Su
    Ji, Yuting
    2015 SEVENTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP), 2015, : 223 - 228
  • [39] A novel chaotic hash-based attribute-based encryption and decryption on cloud computing
    Tamma, Lakshmi Naga Divya
    Ahamad, Shaik Shakeel
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2018, 10 (01) : 1 - 19
  • [40] Lattice-based revocable attribute-based encryption with decryption key exposure resistance
    Dong, Xingting
    Hu, Yupu
    Wang, Baocang
    Liu, Momeng
    Gao, Wen
    IET INFORMATION SECURITY, 2021, 15 (06) : 428 - 441