Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography

被引:43
作者
Odelu, Vanga [1 ]
Das, Ashok Kumar
机构
[1] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
关键词
attribute-based encryption; ciphertext-policy; constant-size secret key; elliptic curve cryptography; security; ATTRIBUTE-BASED-ENCRYPTION; PRIVACY; CIPHERTEXT; SECURITY; SCHEME;
D O I
10.1002/sec.1587
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The energy cost of public-key cryptography is a vital component of modern secure communications. It inhibits the widespread adoption within the ultra-low energy regimes (for example, implantable medical devices and Radio Frequency Identification tags). In the ciphertext-policy attribute-based encryption (CP-ABE), an encryptor can decide the access policy that who can decrypt the data. Thus, data will be protected from the unauthorized users. However, most of the existing CP-ABE schemes require huge storage and computational overheads. Moreover, CP-ABE schemes based on bilinear map loose high efficiency over the elliptic curve cryptography because of the requirement of the security parameters of larger size. These drawbacks prevent the use of ultra-low energy devices in practice. In this paper, we aim to propose a novel expressive AND gate access structured CP-ABE scheme with constant-size secret keys (CSSK) with cost-efficient solutions for encryption and decryption using elliptic curve cryptography, called the CP-ABE-CSSK scheme. In the proposed CP-ABE-CSSK, the size of the secret key is as small as 320 bits. In addition, elliptic curve cryptography is efficient and more suitable for lightweight devices as compared with bilinear pairing-based cryptosystem. Thus, the proposed CP-ABE-CSSK scheme provides low computation and storage overheads with an expressive AND gate access structure as compared with related existing schemes. Consequently, our scheme becomes very practical for CP-ABE key storage and computation cost for ultra-low energy devices. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:4048 / 4059
页数:12
相关论文
共 36 条
  • [1] A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds
    Abbas, Assad
    Khan, Samee U.
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2014, 18 (04) : 1431 - 1441
  • [2] Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6
  • [3] The Internet of Things: A survey
    Atzori, Luigi
    Iera, Antonio
    Morabito, Giacomo
    [J]. COMPUTER NETWORKS, 2010, 54 (15) : 2787 - 2805
  • [4] Privacy in Mobile Technology for Personal Healthcare
    Avancha, Sasikanth
    Baxi, Amit
    Kotz, David
    [J]. ACM COMPUTING SURVEYS, 2012, 45 (01)
  • [5] Barreto PSLM, 2002, LECT NOTES COMPUT SC, V2442, P354
  • [6] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
  • [7] Chen C, 2011, LECT NOTES COMPUT SC, V6980, P84, DOI 10.1007/978-3-642-24316-5_8
  • [8] Cheng Chen, 2013, Topics in Cryptology - CT-RSA 2013. The Cryptographers Track at the RSA Conference 2013. Proceedings, P50, DOI 10.1007/978-3-642-36095-4_4
  • [9] Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
  • [10] Delerablée C, 2007, LECT NOTES COMPUT SC, V4833, P200