Securely outsourcing the ciphertext-policy attribute-based encryption

被引:0
|
作者
Kim Thuat Nguyen
Nouha Oualha
Maryline Laurent
机构
[1] CEA,Institut Mines
[2] LIST,Telecom, Telecom SudParis
[3] Communicating Systems Laboratory,undefined
[4] UMR CNRS,undefined
来源
World Wide Web | 2018年 / 21卷
关键词
CP-ABE encryption; Secure delegation; Security; Internet of things;
D O I
暂无
中图分类号
学科分类号
摘要
Attribute-based Encryption (ABE) is a new and promising public key encryption that allows fine-grained authorization on data based on user attributes. Such property is favorable for multiple applications that require encrypted storage or access control on data, in particular: eHealth applications. However, ABE schemes are known not to be efficient in the encryption phase because ciphertext size and the time required to encrypt grow with the complexity of the access policy. Such drawback is critical in the context of pervasive computing, for instance, in the Internet of Things, where data producers are usually resource-constrained devices, e.g. smart phones or sensing platforms. In this work, we propose OEABE standing for Outsourcing mechanism for the Encryption of Ciphertext-Policy ABE (CP-ABE). We show how a user can offload expensive operations of CP-ABE encryption to a semi-trusted party in a secure manner. Our proposed mechanism requires only one exponentiation on resource-constrained devices. We provide also an informal security analysis of possible attacks from a semi-honest adversary against the proposed solution. To demonstrate the performance gains of our mechanism, we first conducted a performance estimation on an emulated Wismote sensor platform. Then, we implemented our proposal and did comparison to an existing implementation of CP-ABE on a laptop.
引用
收藏
页码:169 / 183
页数:14
相关论文
共 50 条
  • [31] Optimized Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation
    Li, Yang
    Zhu, Jianming
    Wang, Xiuli
    Chai, Yanmei
    Shao, Shuai
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 385 - 394
  • [32] Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
    Shijie Deng
    Gaobo Yang
    Wen Dong
    Ming Xia
    Multimedia Tools and Applications, 2023, 82 : 22251 - 22274
  • [33] A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update
    Liu, Zhe
    Wang, Fuqun
    Chen, Kefei
    Tang, Fei
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [34] Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
    Deng, Shijie
    Yang, Gaobo
    Dong, Wen
    Xia, Ming
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (14) : 22251 - 22274
  • [35] Securely Outsourcing Attribute-Based Encryption with Checkability
    Li, Jin
    Huang, Xinyi
    Li, Jingwei
    Chen, Xiaofeng
    Xiang, Yang
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (08) : 2201 - 2210
  • [36] Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment
    Nayudu P.P.
    Sekhar K.R.
    Computer Systems Science and Engineering, 2023, 46 (01): : 1079 - 1092
  • [37] Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption
    Anada, Hiroaki
    Arita, Seiko
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2017, : 423 - 428
  • [38] Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption
    El Gafif, Hassan
    Toumanari, Ahmed
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [39] Enhancing Data Privacy Protection in Ciphertext-Policy Attribute-Based Encryption
    Patil, Sachin Popat
    Basthikodi, Mustafa
    Kumaraswamy, S.
    Gurpur, Ananth Prabhu
    Raga, Akashraj
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (03) : 1113 - 1124
  • [40] Expressive ciphertext-policy attribute-based encryption with direct user revocation
    Bai C.
    Zhang Y.
    Ma H.
    Liu Z.
    International Journal of Embedded Systems, 2017, 9 (06) : 495 - 504