Key Policy-Attribute Based Fully Homomorphic Encryption (KP-ABFHE) Scheme for Securing Cloud Application in Multi-users Environment

被引:1
|
作者
Tan, Soo Fun [1 ]
Samsudin, Azman [1 ]
机构
[1] Univ Sains Malaysia, Sch Comp Sci, George Town 11800, Malaysia
来源
9TH INTERNATIONAL CONFERENCE ON ROBOTIC, VISION, SIGNAL PROCESSING AND POWER APPLICATIONS: EMPOWERING RESEARCH AND INNOVATION | 2017年 / 398卷
关键词
Cloud computing; Fully homomorphic encryption; Attribute-based encryption; Attribute-based fully homomorphic encryption;
D O I
10.1007/978-981-10-1721-6_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, cloud technologies has become a cost-effective data solution among the small and medium-sized enterprises (SMEs). However, there is a raising concern on its security. This paper proposed the Key Policy-Attribute Based Fully Homomorphic Encryption (KP-ABFHE) scheme for providing an end-to end data protection in multi-users cloud environments. The proposed KP-ABFHE scheme is able to perform the computation while providing fine-grained access on the encrypted data. The proposed scheme is able to handle a monotonic access structure over a set of authorized attributes, without sacrificing the computation capabilities of homomorphic encryption. In addition, this paper proves that the proposed scheme is secure under a selective-set model with the hardness of Decision Ring-LWEd, q,chi problem.
引用
收藏
页码:77 / 86
页数:10
相关论文
共 13 条
  • [1] Multi-user Fully Homomorphic Encryption Scheme Based on Policy for Cloud Computing
    Li, Taoshen
    Liu, Qing
    Huang, Ruwei
    WEB INFORMATION SYSTEMS AND APPLICATIONS (WISA 2021), 2021, 12999 : 274 - 286
  • [2] Ciphertext Policy-Attribute Based Homomorphic Encryption (CP-ABHER-LWE) Scheme: A Fine-Grained Access Control on Outsourced Cloud Data Computation
    Tan, Soo-Fun
    Samsudin, Azman
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 675 - 694
  • [3] An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy Attribute Based Encryption Scheme in Cloud Environments
    Chandrasekaran, Balaji
    Balakrishnan, Ramadoss
    CRYPTOGRAPHY, 2018, 2 (03) : 1 - 15
  • [4] Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application
    Li R.
    Jia C.
    Wang Y.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (03): : 11 - 22
  • [5] An Efficient Attribute-Based Encryption Scheme with Data Security Classification in the Multi-Cloud Environment
    Yang, Guangcan
    Li, Peixuan
    Xiao, Ke
    He, Yunhua
    Xu, Gang
    Wang, Chao
    Chen, Xiubo
    ELECTRONICS, 2023, 12 (20)
  • [6] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Zhong, Hong
    Zhu, Wenlong
    Xu, Yan
    Cui, Jie
    SOFT COMPUTING, 2018, 22 (01) : 243 - 251
  • [7] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Hong Zhong
    Wenlong Zhu
    Yan Xu
    Jie Cui
    Soft Computing, 2018, 22 : 243 - 251
  • [8] A traceable and revocable decentralized attribute-based encryption scheme with fully hidden access policy for cloud-based smart healthcare
    Dai, Yue
    Xue, Lulu
    Yang, Bo
    Wang, Tao
    Zhang, Kejia
    COMPUTER STANDARDS & INTERFACES, 2025, 92
  • [9] An Efficient Hierarchical Multi-Authority Attribute Based Encryption Scheme for Profile Matching using a Fast Ate Pairing in Cloud Environment
    Chandrasekaran, Balaji
    Nogami, Yasuyuki
    Balakrishnan, Ramadoss
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2018, 14 (02) : 151 - 156
  • [10] A Multi-User Ciphertext Policy Attribute-Based Encryption Scheme with Keyword Search for Medical Cloud System
    Lin, Han-Yu
    Jiang, Yan-Ru
    APPLIED SCIENCES-BASEL, 2021, 11 (01): : 1 - 14