Skip to main content
Top

2019 | OriginalPaper | Chapter

Requester-Centric CP-ABE Combining Removing Escrow and Outsourcing Decryption

Authors : Wang Yao, Faguo Wu, Xiao Zhang

Published in: Cyberspace Safety and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Key escrow and low efficiency are two practical bottlenecks of attribute-based encryption. In this paper, a Requester-Centric CP-ABE (RC-CP-ABE) combining removing escrow and outsourcing decryption is proposed. By the bilinear map of composite order, we optimized the computational complexity of key transformation in the case of a large number of attributes. Without adding roles in the system, data requesters can undertake the key transformation which make them the center in the interactive process and the bridge linking removing escrow with outsourcing decryption. Security analysis has been made to prove our algorithm secure.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334 (2007) Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334 (2007)
2.
go back to reference Castiglione, A., et al.: Hierarchical and shared access control. IEEE Trans. Inf. Forensics Secur. 11(4), 850–865 (2016) Castiglione, A., et al.: Hierarchical and shared access control. IEEE Trans. Inf. Forensics Secur. 11(4), 850–865 (2016)
4.
go back to reference Fan, L., Zhao, R., Gong, F.K., Yang, N., Karagiannidis, G.: Secure multiple amplify-and-forward relaying over correlated fading channels. IEEE Trans. Commun. 65(7), 2811–2820 (2017)CrossRef Fan, L., Zhao, R., Gong, F.K., Yang, N., Karagiannidis, G.: Secure multiple amplify-and-forward relaying over correlated fading channels. IEEE Trans. Commun. 65(7), 2811–2820 (2017)CrossRef
5.
go back to reference Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security, pp. 89–98 (2006) Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security, pp. 89–98 (2006)
7.
go back to reference Huang, Q., Zhaofeng, M.A., Yang, Y., Jingyi, F.U., Niu, X.: Eabds:attribute-based secure data sharing with efficient revocation in cloud computing. Chin. J. Electron. 24(4), 862–868 (2015)CrossRef Huang, Q., Zhaofeng, M.A., Yang, Y., Jingyi, F.U., Niu, X.: Eabds:attribute-based secure data sharing with efficient revocation in cloud computing. Chin. J. Electron. 24(4), 862–868 (2015)CrossRef
9.
go back to reference Jiang, W., Wang, G., Bhuiyan, M.Z.A., Wu, J.: Understanding graph-based trust evaluation in online social networks: methodologies and challenges. ACM Comput. Surv. 49(1), 1–35 (2016)CrossRef Jiang, W., Wang, G., Bhuiyan, M.Z.A., Wu, J.: Understanding graph-based trust evaluation in online social networks: methodologies and challenges. ACM Comput. Surv. 49(1), 1–35 (2016)CrossRef
12.
go back to reference Li, H., Liu, D., Dai, Y., Luan, T., Yu, S.: Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Trans. Emerg. Top. Comput. 6(1), 97–109 (2015)CrossRef Li, H., Liu, D., Dai, Y., Luan, T., Yu, S.: Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Trans. Emerg. Top. Comput. 6(1), 97–109 (2015)CrossRef
13.
go back to reference Li, H., Liu, D., Dai, Y., Luan, T.H., Shen, X.S.: Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans. Emerg. Top. Comput. 3(1), 127–138 (2015)CrossRef Li, H., Liu, D., Dai, Y., Luan, T.H., Shen, X.S.: Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans. Emerg. Top. Comput. 3(1), 127–138 (2015)CrossRef
15.
go back to reference Li, J., et al.: Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72, 1–12 (2017)CrossRef Li, J., et al.: Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72, 1–12 (2017)CrossRef
18.
go back to reference Liu, J.K., Man, H.A., Huang, X., Lu, R., Li, J.: Fine-grained two-factor access control for web-based cloud computing services. IEEE Trans. Inf. Forensics Secur. 11(3), 484–497 (2015)CrossRef Liu, J.K., Man, H.A., Huang, X., Lu, R., Li, J.: Fine-grained two-factor access control for web-based cloud computing services. IEEE Trans. Inf. Forensics Secur. 11(3), 484–497 (2015)CrossRef
19.
go back to reference Luo, E., Liu, Q., Wang, G.: Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Commun. Lett. 20(9), 1772–1775 (2016) CrossRef Luo, E., Liu, Q., Wang, G.: Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Commun. Lett. 20(9), 1772–1775 (2016) CrossRef
21.
go back to reference Pan, G., Lei, H., Deng, Y., Fan, L., Yang, J., Chen, Y., Ding, Z.: On secrecy performance of MISO SWIPT systems with TAS and imperfect CSI. IEEE Trans. Commun. 64(9), 3831–3843 (2016)CrossRef Pan, G., Lei, H., Deng, Y., Fan, L., Yang, J., Chen, Y., Ding, Z.: On secrecy performance of MISO SWIPT systems with TAS and imperfect CSI. IEEE Trans. Commun. 64(9), 3831–3843 (2016)CrossRef
24.
go back to reference Wang, S., Liang, K., Liu, J.K., Chen, J.: Attribute-based data sharing scheme revisited in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(8), 1–1 (2016)CrossRef Wang, S., Liang, K., Liu, J.K., Chen, J.: Attribute-based data sharing scheme revisited in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(8), 1–1 (2016)CrossRef
25.
go back to reference Wang, Z., Liu, W.: CP-ABE with outsourced decryption and directionally hidden policy. Secur. Commun. Netw. 9(14), 2387–2396 (2016)CrossRef Wang, Z., Liu, W.: CP-ABE with outsourced decryption and directionally hidden policy. Secur. Commun. Netw. 9(14), 2387–2396 (2016)CrossRef
27.
go back to reference Xhafa, F., Feng, J., Zhang, Y., Chen, X., Li, J.: Privacy-aware attribute-based PHR sharing with user accountability in cloud computing. J. Supercomput. 71(5), 1607–1619 (2015)CrossRef Xhafa, F., Feng, J., Zhang, Y., Chen, X., Li, J.: Privacy-aware attribute-based PHR sharing with user accountability in cloud computing. J. Supercomput. 71(5), 1607–1619 (2015)CrossRef
28.
go back to reference Zhao, R., Yuan, Y., Fan, L., He, Y.C.: Secrecy performance analysis of cognitive decode-and-forward relay networks in nakagami-\(m\) fading channels. IEEE Trans. Commun. 65(2), 549–563 (2017)CrossRef Zhao, R., Yuan, Y., Fan, L., He, Y.C.: Secrecy performance analysis of cognitive decode-and-forward relay networks in nakagami-\(m\) fading channels. IEEE Trans. Commun. 65(2), 549–563 (2017)CrossRef
Metadata
Title
Requester-Centric CP-ABE Combining Removing Escrow and Outsourcing Decryption
Authors
Wang Yao
Faguo Wu
Xiao Zhang
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-37352-8_17

Premium Partner