Outsourcing Decryption of Attribute Based Encryption with Energy Efficiency

被引:4
|
作者
Wang, Xu An [1 ,2 ]
Ma, Jianfeng [2 ]
Xhafa, Fatos [3 ]
机构
[1] Engn Univ Chinese Armed Police Force, Xian, Peoples R China
[2] Xidian Univ, Sch Cyber Engn, Xian, Peoples R China
[3] Univ Politecn Cataluna, E-08028 Barcelona, Spain
关键词
Outsourcing; Decryption of ABE; Energy efficiency; Mobile phone; SECURE IBE;
D O I
10.1109/3PGCIC.2015.99
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a new efficient scheme to outsource the the decryption of attribute based encryption with energy efficiency. We observe all the previous work on outsourcing the decryption of ABE cares little about the ciphertext length. Almost all of them have linear length ciphertext with the attributes or the policy. But we know that transferring so long ciphertexts via wireless network for mobile phone can easily run out the energy of the battery, which hesitates the adaption of these solutions in actual scenarios. In this paper, we propose a new scheme to outsource the decryption of ABE but with constant size ciphertexts, which can achieve high energy efficiency. Compared with the pervious work on outsourcing the decryption of ABE, our work can achieve high energy efficiency and low bandwidth for the mobile phone users.
引用
收藏
页码:444 / 448
页数:5
相关论文
共 50 条
  • [41] A Secure DHT-based Key Distribution System for Attribute-based Encryption and Decryption
    Thatmann, Dirk
    Butyrtschik, Artjom
    Kuepper, Axel
    2015 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2015,
  • [42] Traceable Multiauthority Attribute-Based Encryption with Outsourced Decryption and Hidden Policy for CIoT
    Liu S.
    Yu J.
    Hu C.
    Li M.
    Wireless Communications and Mobile Computing, 2021, 2021
  • [43] Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption
    Rao, Y. Sreenivasa
    Dutta, Ratna
    COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2013, 2013, 8099 : 66 - 81
  • [44] Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation
    Xu, Shengmin
    Yang, Guomin
    Mu, Yi
    INFORMATION SCIENCES, 2019, 479 : 116 - 134
  • [45] On the Optimal Succinctness and Efficiency of Functional Encryption and Attribute-Based Encryption
    Jain, Aayush
    Lin, Huijia
    Luo, Ji
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT III, 2023, 14006 : 479 - 510
  • [46] Forward-Secure Data Outsourcing Based on Revocable Attribute-Based Encryption
    Hoang, Van-Hoan
    Lehtihet, Elyes
    Ghamri-Doudane, Yacine
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1839 - 1846
  • [47] Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain
    Cui, Hui
    Wan, Zhiguo
    Wei, Xinlei
    Nepal, Surya
    Yi, Xun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 (15) : 3227 - 3238
  • [48] User Privacy Protection Scheme Based on Verifiable Outsourcing Attribute-Based Encryption
    Sheng, Luo
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021 (2021)
  • [49] Adaptively secure outsourcing ciphertext-policy attribute-based encryption
    Wang, Hao
    Zheng, Zhihua
    Wu, Lei
    Wang, Yilei
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2270 - 2280
  • [50] Time-based attribute-based proxy re-encryption with decryption key update
    Zhao, Feixiang
    Weng, Jian
    Xie, Wenli
    Hou, Lin
    Li, Ming
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, : 4099 - 4129