Efficient and Expressive Anonymous Attribute-Based Encryption for Mobile Cloud Computing

被引:0
作者
Zhang, Yinghui [1 ,2 ,3 ]
Zheng, Dong [1 ,3 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
来源
ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS | 2017年 / 2卷
基金
中国国家自然科学基金;
关键词
SIGNATURES; SECURE;
D O I
10.1007/978-3-319-49106-6_82
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As a kind of attribute-based encryption, ciphertext-policy attribute-based encryption (CP-ABE) is a potential technique for realizing fine-grained access control on shared data. However, traditional CP-ABE is not suitable for mobile cloud computing, where mobile users are resource-limited and privacy is fragile. In this paper, we propose an anonymous CP-ABE scheme supporting offline key generation and offline encryption. In the proposed scheme, sensitive attribute values specified in an access structure are not explicitly sent along with a ciphertext. The online/offline encryption mechanism alleviates the computational burden of mobile users by performing most of encryption tasks without draining the battery. In addition, the online/offline key generation mechanism allows the attribute authority to finish most of operations in the key generation process in advance, which enables efficient mobile user registration. Finally, the proposed scheme is proven fully secure in the standard model and the performance analysis shows its effectiveness in mobile cloud computing.
引用
收藏
页码:807 / 814
页数:8
相关论文
共 26 条
[1]  
[Anonymous], 1996, SECURE SCHEMES SECRE
[2]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[3]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[4]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[5]   Efficient generic on-line/off-line (threshold) signatures without key exposure [J].
Chen, Xiaofeng ;
Zhang, Fangguo ;
Tian, Haibo ;
Wei, Baodian ;
Susilo, Willy ;
Mu, Yi ;
Lee, Hyunrok ;
Kim, Kwangjo .
INFORMATION SCIENCES, 2008, 178 (21) :4192-4203
[6]  
Chen XF, 2007, LECT NOTES COMPUT SC, V4521, P18
[7]  
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[8]   Fully Secure Online/Offline Predicate and Attribute-Based Encryption [J].
Datta, Pratish ;
Dutta, Ratna ;
Mukhopadhyay, Sourav .
INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 :331-345
[9]  
Even S, 1996, J CRYPTOL, V9, P35, DOI 10.1007/BF02254791
[10]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1