An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy Attribute Based Encryption Scheme in Cloud Environments

被引:2
|
作者
Chandrasekaran, Balaji [1 ]
Balakrishnan, Ramadoss [1 ]
机构
[1] Natl Inst Technol, Dept Comp Applicat, Tiruchirappalli 620015, India
关键词
attribute based encryption; TP-MBNR-PH; KP-ABE; multi-authority; cloud computing;
D O I
10.3390/cryptography2030014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) is used for achieving data confidentiality and access control in cloud environments. Most often ABE schemes are constructed using bilinear pairing which has a higher computational complexity, making algorithms inefficient to some extent. The motivation of this paper is on achieving user privacy during the interaction with attribute authorities by improving the efficiency of ABE schemes in terms of computational complexity. As a result the aim of this paper is two-fold; firstly, to propose an efficient Tate pairing algorithm based on multi-base number representation system using point halving (TP-MBNR-PH) with bases 1/2, 3, and 5 to reduce the cost of bilinear pairing operations and, secondly, the TP-MBNR-PH algorithm is applied in decentralized KP-ABE to compare its computational costs for encryption and decryption with existing schemes.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 50 条
  • [21] Fully Secure Unbounded Revocable Key-Policy Attribute-Based Encryption Scheme
    Wang, Changji
    Fang, Jian
    Xie, Jianguo
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 251 - 264
  • [22] Hierarchical Authority Key-Policy Attribute-Based Encryption
    You, Lin
    Wang, Lijun
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 868 - 872
  • [23] Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Schemes with Fast Decryption
    Rao, Y. Sreenivasa
    INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 521 - 531
  • [24] Key-Policy Multi-authority Attribute-Based Encryption
    Longo, Riccardo
    Marcolla, Chiara
    Sala, Massimiliano
    ALGEBRAIC INFORMATICS (CAI 2015), 2015, 9270 : 152 - 164
  • [25] Adaptable key-policy attribute-based encryption with time interval
    Siqi Ma
    Junzuo Lai
    Robert H. Deng
    Xuhua Ding
    Soft Computing, 2017, 21 : 6191 - 6200
  • [26] Key-Policy Attribute-Based Encryption Based on SM9
    Liu, Xiao-Hong
    Huang, Xin-Yi
    Wu, Wei
    Ning, Jian-Ting
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2025, 40 (01) : 267 - 282
  • [27] Key-Policy Attribute-Based Encryption from Bilinear Maps
    Tiplea, Ferucio Laurentiu
    Dragan, Constantin Catalin
    Nica, Anca-Maria
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATION: 10TH INTERNATIONAL CONFERENCE, SECITC 2017, 2017, 10543 : 28 - 42
  • [28] An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups
    Meng, Ru
    Zhou, Yanwei
    Ning, Jianting
    Liang, Kaitai
    Han, Jinguang
    Susilo, Willy
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 39 - 56
  • [29] Adaptable key-policy attribute-based encryption with time interval
    Ma, Siqi
    Lai, Junzuo
    Deng, Robert H.
    Ding, Xuhua
    SOFT COMPUTING, 2017, 21 (20) : 6191 - 6200
  • [30] An Efficient File Hierarchy Attribute Based Encryption Using Optimized Tate Pairing Construction in Cloud Environment
    Chandrasekaran, Balaji
    Nogami, Yasuyuki
    Balakrishnan, Ramadoss
    JOURNAL OF APPLIED SECURITY RESEARCH, 2020, 15 (02) : 270 - 278