Unbounded and Efficient Revocable Attribute-Based Encryption With Adaptive Security for Cloud-Assisted Internet of Things

被引:29
作者
Xiong, Hu [1 ]
Huang, Xin [1 ]
Yang, Minghao [1 ]
Wang, Lili [1 ]
Yu, Shui [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Peoples R China
[2] Univ Technol Sydney, Sch Compute Sci, Sydney, NSW 2007, Australia
关键词
Attribute-based encryption (ABE); cloud-assisted Internet of Things (IoT); monotonic span program (MSP); revocation; unbounded; ACCESS-CONTROL; PRIVACY; SYSTEM;
D O I
10.1109/JIOT.2021.3094323
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing attribute-based encryption (ABE) schemes with revocation to secure the cloud-assisted Internet of Things (IoTs) raise challenges, such as eliminating the need for predefined public parameters in system initialization, performing the encryption and decryption operations efficiently, and achieving adaptive security under standard security assumption. In this article, we address these challenges by proposing an unbounded and efficient revocable ABE scheme with adaptive security for cloud-assisted IoTs. Distinct from the previous approaches in this field, our scheme not only efficiently realizes access control over encrypted data in a fine-grained and revocable way but also is proved to be adaptively secure under standard decision linear assumption. Meanwhile, the parameters do not need to be predefined in the system initialization and thus, our scheme satisfies the unbounded property. Moreover, the monotonic span program (MSP) is elegantly utilized as the access structure to reduce the number of bilinear pairing and exponentiation operations for encryption and decryption. Theoretical performance analysis and experiment evaluation disclose that our proposed scheme owns outstanding feasibility, efficiency, and effectiveness.
引用
收藏
页码:3097 / 3111
页数:15
相关论文
共 45 条
[1]   FAME: Fast Attribute-based Message Encryption [J].
Agrawal, Shashank ;
Chase, Melissa .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :665-682
[2]   Attribute Based Encryption for Deterministic Finite Automata from DLIN [J].
Agrawal, Shweta ;
Maitra, Monosij ;
Yamada, Shota .
THEORY OF CRYPTOGRAPHY, TCC 2019, PT II, 2019, 11892 :91-117
[3]  
[Anonymous], 2010, P 5 ACM S INF COMP C
[4]   Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions [J].
Attrapadung, Nuttapong ;
Tomida, Junichi .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2020, PT III, 2020, 12493 :405-436
[5]   Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption [J].
Attrapadung, Nuttapong .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT I, 2019, 11476 :34-67
[6]  
Attrapadung N, 2014, LECT NOTES COMPUT SC, V8441, P557, DOI 10.1007/978-3-642-55220-5_31
[7]  
Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6
[8]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[9]  
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[10]   On the Internet of Medical Things [J].
Cerf, Vinton G. .
COMMUNICATIONS OF THE ACM, 2020, 63 (08) :5-5