An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy Attribute Based Encryption Scheme in Cloud Environments

被引:2
|
作者
Chandrasekaran, Balaji [1 ]
Balakrishnan, Ramadoss [1 ]
机构
[1] Natl Inst Technol, Dept Comp Applicat, Tiruchirappalli 620015, India
关键词
attribute based encryption; TP-MBNR-PH; KP-ABE; multi-authority; cloud computing;
D O I
10.3390/cryptography2030014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) is used for achieving data confidentiality and access control in cloud environments. Most often ABE schemes are constructed using bilinear pairing which has a higher computational complexity, making algorithms inefficient to some extent. The motivation of this paper is on achieving user privacy during the interaction with attribute authorities by improving the efficiency of ABE schemes in terms of computational complexity. As a result the aim of this paper is two-fold; firstly, to propose an efficient Tate pairing algorithm based on multi-base number representation system using point halving (TP-MBNR-PH) with bases 1/2, 3, and 5 to reduce the cost of bilinear pairing operations and, secondly, the TP-MBNR-PH algorithm is applied in decentralized KP-ABE to compare its computational costs for encryption and decryption with existing schemes.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 50 条
  • [31] An Efficient Attribute-Based Encryption Scheme With Policy Update and File Update in Cloud Computing
    Li, Jianqiang
    Wang, Shulan
    Li, Yuan
    Wang, Haiyan
    Wang, Huiwen
    Wang, Huihui
    Chen, Jianyong
    You, Zhuhong
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (12) : 6500 - 6509
  • [32] A Key-Policy Searchable Attribute-Based Encryption Scheme for Efficient Keyword Search and Fine-Grained Access Control over Encrypted Data
    Yin, Hui
    Xiong, Yinqiao
    Zhang, Jixin
    Ou, Lu
    Liao, Shaolin
    Qin, Zheng
    ELECTRONICS, 2019, 8 (03)
  • [33] An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
    Wang, Shulan
    Zhou, Junwei
    Liu, Joseph K.
    Yu, Jianping
    Chen, Jianyong
    Xie, Weixin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1265 - 1277
  • [34] Scalable Key-Policy Attribute-Based Encryption under the Strictly Weaker Assumption Family
    Deng Y.-Q.
    Song G.
    Tang C.-M.
    Wen Y.-M.
    Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (04): : 883 - 895
  • [35] A traceable and revocable decentralized attribute-based encryption scheme with fully hidden access policy for cloud-based smart healthcare
    Dai, Yue
    Xue, Lulu
    Yang, Bo
    Wang, Tao
    Zhang, Kejia
    COMPUTER STANDARDS & INTERFACES, 2025, 92
  • [36] Implementing efficient attribute encryption in IoV under cloud environments
    Xie, Pengshou
    Yang, Haoxuan
    Feng, Tao
    Yan, Yan
    COMPUTER NETWORKS, 2022, 218
  • [37] An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud
    Ji, Honghan
    Zhang, Hongjie
    Shao, Lisong
    He, Debiao
    Luo, Min
    CONNECTION SCIENCE, 2021, 33 (04) : 1094 - 1115
  • [38] Collaborative Key Management in Ciphertext Policy Attribute Based Encryption for Cloud
    Ghuge, Mayur N.
    Chatur, Prashant N.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 156 - 158
  • [39] Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption
    Hayata, Junichiro
    Ishizaka, Masahito
    Sakai, Yusuke
    Hanaoka, Goichiro
    Matsuura, Kanta
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 107 - 113
  • [40] An IND-CCA2 Secure Key-Policy Attribute-Based Key Encapsulation Scheme
    Wang, Chang-Ji
    Liu, Yang
    Kim, Jung-Tae
    JOURNAL OF INTERNET TECHNOLOGY, 2010, 11 (05): : 619 - 625