CP-ABE With Constant-Size Keys for Lightweight Devices

被引:130
作者
Guo, Fuchun [1 ]
Mu, Yi [1 ]
Susilo, Willy [1 ]
Wong, Duncan S. [2 ]
Varadharajan, Vijay [3 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2500, Australia
[2] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[3] Macquarie Univ, Dept Comp, N Ryde, NSW 2109, Australia
关键词
Attribute-based encryption; ciphertext policy; short decryption key; ATTRIBUTE-BASED ENCRYPTION; CIPHERTEXTS;
D O I
10.1109/TIFS.2014.2309858
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Lightweight devices, such as radio frequency identification tags, have a limited storage capacity, which has become a bottleneck for many applications, especially for security applications. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic tool, where the encryptor can decide the access structure that will be used to protect the sensitive data. However, current CP-ABE schemes suffer from the issue of having long decryption keys, in which the size is linear to and dependent on the number of attributes. This drawback prevents the use of lightweight devices in practice as a storage of the decryption keys of the CP-ABE for users. In this paper, we provide an affirmative answer to the above long standing issue, which will make the CP-ABE very practical. We propose a novel CP-ABE scheme with constant-size decryption keys independent of the number of attributes. We found that the size can be as small as 672 bits. In comparison with other schemes in the literature, the proposed scheme is the only CP-ABE with expressive access structures, which is suitable for CP-ABE key storage in lightweight devices.
引用
收藏
页码:763 / 771
页数:9
相关论文
共 35 条
  • [1] [Anonymous], LNCS
  • [2] Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6
  • [3] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [4] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [5] Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
  • [6] Chen C, 2011, LECT NOTES COMPUT SC, V6980, P84, DOI 10.1007/978-3-642-24316-5_8
  • [7] Cheng Chen, 2013, Topics in Cryptology - CT-RSA 2013. The Cryptographers Track at the RSA Conference 2013. Proceedings, P50, DOI 10.1007/978-3-642-36095-4_4
  • [8] Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
  • [9] Delerablée C, 2007, LECT NOTES COMPUT SC, V4833, P200
  • [10] Emura K, 2009, LECT NOTES COMPUT SC, V5451, P13, DOI 10.1007/978-3-642-00843-6_2