A Lightweight Attribute Based Encryption Scheme with Constant Size Ciphertext for Internet of Things

被引:11
|
作者
Yang, Wenti [1 ]
Wang, Ruimiao [1 ]
Guan, Zhitao [1 ]
Wu, Longfei [2 ]
Du, Xiaojiang [3 ]
Guizani, Mohsen [4 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing, Peoples R China
[2] Fayetteville State Univ, Dept Math & Comp Sci, Fayetteville, NC 28301 USA
[3] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[4] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
基金
中国国家自然科学基金; 国家重点研发计划; 北京市自然科学基金;
关键词
IoT; CP-ABE; constant-size ciphertexts; full security; THRESHOLD;
D O I
10.1109/icc40277.2020.9149294
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of Things technology has been used in a wide range of fields, ranging from industrial applications to individual lives. As a result, a massive amount of sensitive data is generated and transmitted by IoT devices. Those data may be accessed by a large nusmber of complex users. Therefore, it is necessary to adopt an encryption scheme with access control to achieve more flexible and secure access to sensitive data. The Ciphertext Policy Attribute-Based Encryption (CP-ABE) can achieve access control while encrypting data can match the requirements mentioned above. However, the long ciphertext and the slow decryption operation makes it difficult to be used in most IoT devices which have limited memory size and computing capability. This paper proposes a modified CP-ABE scheme, which can implement the full security (adaptive security) under the access structure of AND gate. Moreover, the decryption overhead and the length of ciphertext are constant. Finally, the analysis and experiments prove the feasibility of our scheme.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Encryption of ciphertext data in Internet of Things based on HECRT key management
    Wang, Meini
    Zhao, Wei
    Li, Ying
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2022, 15 (02) : 166 - 183
  • [32] Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption
    Doshi, Nishant
    Jinwala, Devesh C.
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1988 - 2002
  • [33] Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length
    Li, Jiguo
    Sha, Fengjie
    Zhang, Yichen
    Huang, Xinyi
    Shen, Jian
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [34] Efficient and Verifiable Encryption Scheme in Lightweight Narrowband Internet of Things Applications
    Qian H.
    Wang Y.
    Peng T.
    Chen C.
    Luo X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (05): : 1112 - 1122
  • [35] Constant Ciphertext Size Multi-Authority Attribute-based Scheme without Key Escrow
    Hu, Shengzhou
    Li, Jiguo
    Lu, Yang
    Zhang, Yichen
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (06): : 1647 - 1657
  • [36] Outsourced Attribute-Based Encryption Scheme with Policy Updating and Verifiable Ciphertext
    Su, Zelin
    Zhang, Wenfang
    Wang, Xiaomin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (12): : 3088 - 3097
  • [37] A Compact Ciphertext-Policy Attribution-Based Encryption Scheme for the Information-Centric Internet of Things
    Wang, Jing
    Xiong, Neal Naixue
    Wang, Jinhai
    Yeh, Wei-Chang
    IEEE ACCESS, 2018, 6 : 63513 - 63526
  • [38] Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage
    Zhang, Qiuyu
    Zhao, Zhenyu
    Fu, Minrui
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [39] An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption
    Hu, Ronglei
    Ma, Ziwei
    Li, Li
    Zuo, Peiliang
    Li, Xiuying
    Wei, Jiaxin
    Liu, Sihui
    SENSORS, 2023, 23 (19)
  • [40] A Secure Ciphertext Self-Destruction Scheme with Attribute-Based Encryption
    Yang, Tonghao
    Li, Junquan
    Yu, Bin
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015