An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy Attribute Based Encryption Scheme in Cloud Environments

被引:2
|
作者
Chandrasekaran, Balaji [1 ]
Balakrishnan, Ramadoss [1 ]
机构
[1] Natl Inst Technol, Dept Comp Applicat, Tiruchirappalli 620015, India
关键词
attribute based encryption; TP-MBNR-PH; KP-ABE; multi-authority; cloud computing;
D O I
10.3390/cryptography2030014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) is used for achieving data confidentiality and access control in cloud environments. Most often ABE schemes are constructed using bilinear pairing which has a higher computational complexity, making algorithms inefficient to some extent. The motivation of this paper is on achieving user privacy during the interaction with attribute authorities by improving the efficiency of ABE schemes in terms of computational complexity. As a result the aim of this paper is two-fold; firstly, to propose an efficient Tate pairing algorithm based on multi-base number representation system using point halving (TP-MBNR-PH) with bases 1/2, 3, and 5 to reduce the cost of bilinear pairing operations and, secondly, the TP-MBNR-PH algorithm is applied in decentralized KP-ABE to compare its computational costs for encryption and decryption with existing schemes.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 50 条
  • [1] Efficient key-policy attribute-based encryption scheme
    Xu, Zhiqin
    Zhang, Leyou
    ICIC Express Letters, 2015, 9 (01): : 31 - 35
  • [2] Large universe decentralized key-policy attribute-based encryption
    Li, Qi
    Ma, Jianfeng
    Li, Rui
    Xiong, Jinbo
    Liu, Ximeng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (03) : 501 - 509
  • [3] Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation
    Ghopur, Dilxat
    Ma, Jianfeng
    Ma, Xindi
    Hao, Jialu
    Jiang, Tao
    Wang, Xiangyu
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 3999 - 4011
  • [4] An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
    Wang, Changji
    Luo, Jianfa
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [5] Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test
    Liao, Yongjian
    Chen, Hongjie
    Li, Fagen
    Jiang, Shaoquan
    Zhou, Shijie
    Mohammed, Ramadan
    IEEE ACCESS, 2018, 6 : 10189 - 10196
  • [6] Key-policy attribute-based encryption scheme for general circuits
    Hu P.
    Gao H.-Y.
    Ruan Jian Xue Bao/Journal of Software, 2016, 27 (06): : 1498 - 1510
  • [7] Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme
    Ge, Aijun
    Zhang, Jiang
    Zhang, Rui
    Ma, Chuangui
    Zhang, Zhenfeng
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (11) : 2319 - 2321
  • [8] Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (11) : 2150 - 2162
  • [9] KEY-POLICY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR GENERAL CIRCUITS
    Bolocan, Diana
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2020, 21 (01): : 11 - 19
  • [10] Privacy-Preserving Decentralized Key-Policy Attribute-Based Signcryption in Cloud Computing Environments
    Meng Xian Yong
    Chen Zhong
    Meng Xiang Yu
    SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS II, PTS 1 AND 2, 2014, 475-476 : 1144 - +