Constant Size CP-ABE with Scalable Revocation for Resource-Constrained IoT Devices

被引:0
|
作者
Sethia, Divyashikha [1 ]
Shakya, Anadi [1 ]
Aggarwal, Ritik [1 ]
Bhayana, Saksham [1 ]
机构
[1] Delhi Technol Univ, Comp Sci & Engn, Delhi, India
关键词
IoT; CP-ABE; constant ciphertext; scalable revocation; CCA-secure;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Users can directly access and share information from portable devices such as a smartphone or an Internet of Things (IoT) device. However, to prevent them from becoming victims to launch cyber attacks, they must allow selective sharing based on roles of the users such as with the Ciphertext-Policy Attribute Encryption (CP-ABE) scheme. However, to match the resource constraints, the scheme must be efficient for storage. It must also protect the device from malicious users as well as allow uninterrupted access to valid users. This paper presents the CCA secure PROxy-based Scalable Revocation for Constant Ciphertext (C-PROSRCC) scheme, which provides scalable revocation for a constant ciphertext length CP-ABE scheme. The scheme has a constant number of pairings and computations. It can also revoke any number of users and does not require re-encryption or redistribution of keys. We have successfully implemented the C-PROSRCC scheme. The qualitative and quantitative comparison with related schemes indicates that C-PROSRCC performs better with acceptable overheads. C-PROSRCC is Chosen Ciphertext Attack (CCA) secure. We also present a case study to demonstrate the use of C-PROSRCC for mobile-based selective sharing of a family car.
引用
下载
收藏
页码:951 / 957
页数:7
相关论文
共 50 条
  • [1] Selective IoT Access with Scalable CP-ABE Revocation and Delegation
    Sethia, Divyashikha
    Gupta, Daya
    Dabas, Harsh
    Nagar, Preeti
    Saran, Huzur
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 703 - 708
  • [2] CP-ABE With Constant-Size Keys for Lightweight Devices
    Guo, Fuchun
    Mu, Yi
    Susilo, Willy
    Wong, Duncan S.
    Varadharajan, Vijay
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (05) : 763 - 771
  • [3] Efficient ECC-Based CP-ABE Scheme With Constant-Sized Key and Scalable User Revocation
    Sethia, Divyashikha
    Sahu, Raj
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [4] Deduplication-enabled CP-ABE with revocation
    Tiantian Zhou
    Zehui Tang
    Shengke Zeng
    Minfeng Shao
    Peer-to-Peer Networking and Applications, 2025, 18 (2)
  • [5] CP-ABE Scheme with Revocation for Cloud Storage
    Pan, Ning
    Sun, Lei
    Mao, Xiuqing
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 : 467 - 475
  • [6] An enhanced constant length traceable CP-ABE in IoT paradigm
    Doshi, Nishant
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2023, 15 (03) : 315 - 321
  • [7] Performance Evaluation of CP-ABE Schemes under Constrained Devices
    Taha, Mohammad Bany
    Talhi, Chamseddine
    Ould-Slimane, Hakima
    16TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2019),THE 14TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2019),THE 9TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, 2019, 155 : 425 - 432
  • [8] A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation
    Zhang, Ruoqing
    Hui, Lucas
    Yiu, Sm
    Yu, Xiaoqi
    Liu, Zechao
    Jiang, Zoe L.
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 363 - 370
  • [9] Smart offloading technique for CP-ABE encryption schemes in constrained devices
    Mohammad Bany Taha
    Hakima Ould-Slimane
    Chamseddine Talhi
    SN Applied Sciences, 2020, 2
  • [10] Smart offloading technique for CP-ABE encryption schemes in constrained devices
    Taha, Mohammad Bany
    Ould-Slimane, Hakima
    Talhi, Chamseddine
    SN APPLIED SCIENCES, 2020, 2 (02):