An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy Attribute Based Encryption Scheme in Cloud Environments

被引:2
|
作者
Chandrasekaran, Balaji [1 ]
Balakrishnan, Ramadoss [1 ]
机构
[1] Natl Inst Technol, Dept Comp Applicat, Tiruchirappalli 620015, India
关键词
attribute based encryption; TP-MBNR-PH; KP-ABE; multi-authority; cloud computing;
D O I
10.3390/cryptography2030014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) is used for achieving data confidentiality and access control in cloud environments. Most often ABE schemes are constructed using bilinear pairing which has a higher computational complexity, making algorithms inefficient to some extent. The motivation of this paper is on achieving user privacy during the interaction with attribute authorities by improving the efficiency of ABE schemes in terms of computational complexity. As a result the aim of this paper is two-fold; firstly, to propose an efficient Tate pairing algorithm based on multi-base number representation system using point halving (TP-MBNR-PH) with bases 1/2, 3, and 5 to reduce the cost of bilinear pairing operations and, secondly, the TP-MBNR-PH algorithm is applied in decentralized KP-ABE to compare its computational costs for encryption and decryption with existing schemes.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 50 条
  • [1] Large universe decentralized key-policy attribute-based encryption
    Li, Qi
    Ma, Jianfeng
    Li, Rui
    Xiong, Jinbo
    Liu, Ximeng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (03) : 501 - 509
  • [2] Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test
    Liao, Yongjian
    Chen, Hongjie
    Li, Fagen
    Jiang, Shaoquan
    Zhou, Shijie
    Mohammed, Ramadan
    IEEE ACCESS, 2018, 6 : 10189 - 10196
  • [3] Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (11) : 2150 - 2162
  • [4] Privacy-Preserving Decentralized Key-Policy Attribute-Based Signcryption in Cloud Computing Environments
    Meng Xian Yong
    Chen Zhong
    Meng Xiang Yu
    SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS II, PTS 1 AND 2, 2014, 475-476 : 1144 - +
  • [5] Key-policy attribute-based encryption scheme for general circuits
    Hu P.
    Gao H.-Y.
    Ruan Jian Xue Bao/Journal of Software, 2016, 27 (06): : 1498 - 1510
  • [6] Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme
    Ge, Aijun
    Zhang, Jiang
    Zhang, Rui
    Ma, Chuangui
    Zhang, Zhenfeng
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (11) : 2319 - 2321
  • [7] Efficient Revocable Key-Policy Attribute Based Encryption with Full Security
    Zhang, Fengli
    Li, Qinyi
    Xiong, Hu
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 477 - 481
  • [8] Key-Policy Attribute-Based Encryption With Equality Test in Cloud Computing
    Zhu, Huijun
    Wang, Licheng
    Ahmad, Haseeb
    Niu, Xinxin
    IEEE ACCESS, 2017, 5 : 20428 - 20439
  • [9] User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
    Rahulamathavan, Yogachandran
    Veluru, Suresh
    Han, Jinguang
    Li, Fei
    Rajarajan, Muttukrishnan
    Lu, Rongxing
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (09) : 2939 - 2946
  • [10] Towards Attribute Revocation in Key-Policy Attribute Based Encryption
    Wang, Pengpian
    Feng, Dengguo
    Zhang, Liwu
    CRYPTOLOGY AND NETWORK SECURITY, 2011, 7092 : 272 - 291