A Lightweight Attribute Based Encryption Scheme with Constant Size Ciphertext for Internet of Things

被引:11
|
作者
Yang, Wenti [1 ]
Wang, Ruimiao [1 ]
Guan, Zhitao [1 ]
Wu, Longfei [2 ]
Du, Xiaojiang [3 ]
Guizani, Mohsen [4 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing, Peoples R China
[2] Fayetteville State Univ, Dept Math & Comp Sci, Fayetteville, NC 28301 USA
[3] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[4] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
基金
国家重点研发计划; 中国国家自然科学基金; 北京市自然科学基金;
关键词
IoT; CP-ABE; constant-size ciphertexts; full security; THRESHOLD;
D O I
10.1109/icc40277.2020.9149294
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of Things technology has been used in a wide range of fields, ranging from industrial applications to individual lives. As a result, a massive amount of sensitive data is generated and transmitted by IoT devices. Those data may be accessed by a large nusmber of complex users. Therefore, it is necessary to adopt an encryption scheme with access control to achieve more flexible and secure access to sensitive data. The Ciphertext Policy Attribute-Based Encryption (CP-ABE) can achieve access control while encrypting data can match the requirements mentioned above. However, the long ciphertext and the slow decryption operation makes it difficult to be used in most IoT devices which have limited memory size and computing capability. This paper proposes a modified CP-ABE scheme, which can implement the full security (adaptive security) under the access structure of AND gate. Moreover, the decryption overhead and the length of ciphertext are constant. Finally, the analysis and experiments prove the feasibility of our scheme.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption
    Hu, Ronglei
    Ma, Ziwei
    Li, Li
    Zuo, Peiliang
    Li, Xiuying
    Wei, Jiaxin
    Liu, Sihui
    SENSORS, 2023, 23 (19)
  • [42] Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage
    Zhang, Qiuyu
    Zhao, Zhenyu
    Fu, Minrui
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [43] A Secure Ciphertext Self-Destruction Scheme with Attribute-Based Encryption
    Yang, Tonghao
    Li, Junquan
    Yu, Bin
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [44] Ciphertext-policy attribute-based encryption scheme with verifiability on authority
    Yu J.
    He X.
    Yan X.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (04): : 49 - 57
  • [45] Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices
    Malluhi, Q. M.
    Shikfa, A.
    Tran, V. D.
    Trinh, V. C.
    COMPUTER COMMUNICATIONS, 2019, 145 : 113 - 125
  • [46] Security analysis for a ciphertext-policy attribute-based encryption scheme
    Zeng, Fugeng
    Xu, Chunxiang
    Zhang, Xinpeng
    Advances in Information Sciences and Service Sciences, 2012, 4 (12): : 201 - 207
  • [47] Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme
    Fu, Xingbing
    Nie, Xuyun
    Li, Fagen
    INFORMATION, 2015, 6 (03): : 481 - 493
  • [48] Revocable Sliced CipherText Policy Attribute Based Encryption Scheme in Cloud Computing
    Bouchaala, Mariem
    Ghazel, Cherif
    Saidane, Leila Azouz
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1860 - 1865
  • [49] Directly Revocable Attribute Based Encryption Scheme under Ciphertext-Policy
    Aqeel, Humera
    Ali, Syed Taqi
    2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 365 - 369
  • [50] Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication
    Diro, Abebe
    Reda, Haftu
    Chilamkurti, Naveen
    Mahmood, Abdun
    Zaman, Noor
    Nam, Yunyoung
    IEEE ACCESS, 2020, 8 : 60539 - 60551