An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy Attribute Based Encryption Scheme in Cloud Environments

被引:2
|
作者
Chandrasekaran, Balaji [1 ]
Balakrishnan, Ramadoss [1 ]
机构
[1] Natl Inst Technol, Dept Comp Applicat, Tiruchirappalli 620015, India
关键词
attribute based encryption; TP-MBNR-PH; KP-ABE; multi-authority; cloud computing;
D O I
10.3390/cryptography2030014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) is used for achieving data confidentiality and access control in cloud environments. Most often ABE schemes are constructed using bilinear pairing which has a higher computational complexity, making algorithms inefficient to some extent. The motivation of this paper is on achieving user privacy during the interaction with attribute authorities by improving the efficiency of ABE schemes in terms of computational complexity. As a result the aim of this paper is two-fold; firstly, to propose an efficient Tate pairing algorithm based on multi-base number representation system using point halving (TP-MBNR-PH) with bases 1/2, 3, and 5 to reduce the cost of bilinear pairing operations and, secondly, the TP-MBNR-PH algorithm is applied in decentralized KP-ABE to compare its computational costs for encryption and decryption with existing schemes.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 50 条
  • [31] A Secure Enhanced Key-Policy Attribute-Based Temporary Keyword Search Scheme in the Cloud
    Zhang, Kai
    Liu, Ximeng
    Li, Yanping
    Zhang, Tao
    Yang, Shuhua
    IEEE ACCESS, 2020, 8 : 127845 - 127855
  • [32] A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage
    Ameri, Mohammad Hassan
    Delavar, Mahshid
    Mohajeri, Javad
    Salmasizadeh, Mahmoud
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (03) : 660 - 671
  • [33] Key-policy attribute-based encryption against continual auxiliary input leakage
    Li, Jiguo
    Yu, Qihong
    Zhang, Yichen
    Shen, Jian
    INFORMATION SCIENCES, 2019, 470 (175-188) : 175 - 188
  • [34] Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
    Shi, Yanfeng
    Zheng, Qingji
    Liu, Jigiang
    Han, Zhen
    INFORMATION SCIENCES, 2015, 295 : 221 - 231
  • [35] Key-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control
    Liu, Ximeng
    Zhu, Hui
    Ma, Jianfeng
    Ma, Jun
    Ma, Siqi
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC), 2014, : 694 - 699
  • [36] Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
    Attrapadung, Nuttapong
    Libert, Benoit
    de Panafieu, Elie
    PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 90 - +
  • [37] Unbounded Key-Policy Attribute-based Encryption with Black-Box Traceability
    Ye, Yunxiu
    Cao, Zhenfu
    Shen, Jiachen
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1655 - 1663
  • [38] Key-Policy Attribute-Based Encryption for Boolean Circuits from Bilinear Maps
    Tiplea, Ferucio Laurentiu
    Dragan, Constantin Catalin
    CRYPTOGRAPHY AND INFORMATION SECURITY IN THE BALKANS, 2015, 9024 : 175 - 193
  • [39] An IND-CCA2 Secure Key-Policy Attribute Based Key Encapsulation Scheme
    Wang, Changji
    Liu, Yang
    Kim, Jung-Tae
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 449 - +
  • [40] High efficient key-insulated attribute based encryption scheme without bilinear pairing operations
    Hong, Hanshu
    Sun, Zhixin
    SPRINGERPLUS, 2016, 5 : 1 - 12