CP-ABE Scheme Satisfying Constant-size Keys based on ECC

被引:2
作者
Raj, Nishant [1 ]
Pais, Alwyn Roshan [1 ]
机构
[1] Natl Inst Technol Karnataka, Dept Comp Sci & Engn, Surathkal, Karnataka, India
来源
PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1 | 2020年
关键词
Ciphertext-policy Attribute-based Encryption; Elliptic Curve based Cryptography; Cloud Computing; Security; Constant-size Secret Key;
D O I
10.5220/0009590905350540
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud-based applications, especially on IoT devices, is one of the desired fields to apply Ciphertext-Policy Attribute-Based Encryption (CP-ABE). Most of the IoT devices are with the low-end configuration; hence, they need better time and computation efficient algorithms. There are existing algorithms, but none of the systems are based on conventional cryptosystems as well as secure at the same time. Here, we propose a CP-ABE scheme based on the elliptic curve cryptosystem with a constant-size secret key, which is capable of addressing the collusion attack security issue.
引用
收藏
页码:535 / 540
页数:6
相关论文
共 10 条
  • [1] Boneh Dan., 2004, Efficient selective-ID secure Identity Based encryptions without random oracles in Eurocrypt
  • [2] Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
  • [3] CP-ABE With Constant-Size Keys for Lightweight Devices
    Guo, Fuchun
    Mu, Yi
    Susilo, Willy
    Wong, Duncan S.
    Varadharajan, Vijay
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (05) : 763 - 771
  • [4] Attribute-based encryption implies identity-based encryption
    Herranz, Javier
    [J]. IET INFORMATION SECURITY, 2017, 11 (06) : 332 - 337
  • [5] EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid
    Li, Hongwei
    Lin, Xiaodong
    Yang, Haomiao
    Liang, Xiaohui
    Lu, Rongxing
    Shen, Xuemin
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (08) : 2053 - 2064
  • [6] Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography
    Odelu, Vanga
    Das, Ashok Kumar
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4048 - 4059
  • [7] Pharkkavi D., 2018, INT J ADV RES COMPUT, V9
  • [8] Fuzzy identity-based encryption
    Sahai, A
    Waters, B
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 457 - 473
  • [9] Comment on "A strong provably secure IBE scheme without bilinear map" by M. Zheng, Y. Xiang and H. Zhou [J. Comput. Syst. Sci. 81 (2015) 125-131]
    Vergnaud, Damien
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2016, 82 (05) : 756 - 757
  • [10] Zhang YH, 2014, LECT NOTES COMPUT SC, V8782, P259, DOI 10.1007/978-3-319-12475-9_18