Skip to main content
Top
Published in: World Wide Web 1/2018

03-08-2017

Securely outsourcing the ciphertext-policy attribute-based encryption

Authors: Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent

Published in: World Wide Web | Issue 1/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Attribute-based Encryption (ABE) is a new and promising public key encryption that allows fine-grained authorization on data based on user attributes. Such property is favorable for multiple applications that require encrypted storage or access control on data, in particular: eHealth applications. However, ABE schemes are known not to be efficient in the encryption phase because ciphertext size and the time required to encrypt grow with the complexity of the access policy. Such drawback is critical in the context of pervasive computing, for instance, in the Internet of Things, where data producers are usually resource-constrained devices, e.g. smart phones or sensing platforms. In this work, we propose OEABE standing for Outsourcing mechanism for the Encryption of Ciphertext-Policy ABE (CP-ABE). We show how a user can offload expensive operations of CP-ABE encryption to a semi-trusted party in a secure manner. Our proposed mechanism requires only one exponentiation on resource-constrained devices. We provide also an informal security analysis of possible attacks from a semi-honest adversary against the proposed solution. To demonstrate the performance gains of our mechanism, we first conducted a performance estimation on an emulated Wismote sensor platform. Then, we implemented our proposal and did comparison to an existing implementation of CP-ABE on a laptop.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Alomair, B., Poovendran, R.: Unconditionally secure authenticated encryption with shorter keys. In: WOSIS (2009) Alomair, B., Poovendran, R.: Unconditionally secure authenticated encryption with shorter keys. In: WOSIS (2009)
2.
go back to reference Ambrosin, M., conti, M., Dargahi, T.: On the feasibility of attribute-based encryption on smartphone devices. IoT-Sys ’15 (2015) Ambrosin, M., conti, M., Dargahi, T.: On the feasibility of attribute-based encryption on smartphone devices. IoT-Sys ’15 (2015)
3.
go back to reference Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62–73. 1 (1993) Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62–73. 1 (1993)
4.
go back to reference Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE S & P (2007) Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE S & P (2007)
5.
go back to reference Bianchi, G., Capossele, A.T., Petrioli, C., Spenza, D.: Agree: exploiting energy harvesting to support data-centric access control in wsns. Ad Hoc Netw. 11(8), 2625–2636 (2013)CrossRef Bianchi, G., Capossele, A.T., Petrioli, C., Spenza, D.: Agree: exploiting energy harvesting to support data-centric access control in wsns. Ad Hoc Netw. 11(8), 2625–2636 (2013)CrossRef
6.
go back to reference Chen, C., Zhang, Z., Feng, D.: Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost. In: Provable Security, pp. 84–101. Springer (2011) Chen, C., Zhang, Z., Feng, D.: Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost. In: Provable Security, pp. 84–101. Springer (2011)
7.
go back to reference Cisco global cloud index: Forecast and methodology, 2014-2019 white paper Cisco global cloud index: Forecast and methodology, 2014-2019 white paper
9.
go back to reference Dunkels, A., Grönvall, B., Voigt, T.: Contiki-a lightweight and flexible operating system for tiny networked sensors. In: IEEE LCN (2004) Dunkels, A., Grönvall, B., Voigt, T.: Contiki-a lightweight and flexible operating system for tiny networked sensors. In: IEEE LCN (2004)
10.
go back to reference Gartner inc., Forecast: The internet of things worldwide (2013) Gartner inc., Forecast: The internet of things worldwide (2013)
11.
go back to reference Goldreich, O.: Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press (2009) Goldreich, O.: Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press (2009)
12.
go back to reference Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: Automata, Languages and Programming, pp. 579–591. Springer (2008) Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: Automata, Languages and Programming, pp. 579–591. Springer (2008)
13.
go back to reference Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of abe ciphertexts. In: USENIX Security Symposium, Volume 2011 (2011) Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of abe ciphertexts. In: USENIX Security Symposium, Volume 2011 (2011)
14.
go back to reference Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Advances in Cryptology–EUROCRYPT 2011, pp. 568–588. Springer (2011) Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Advances in Cryptology–EUROCRYPT 2011, pp. 568–588. Springer (2011)
15.
go back to reference Nguyen, K.T., Laurent, M., Oualha, N.: Lightweight certificateless and provably-secure signcryptosystem for the internet of things. In: IEEE Trustcom (2015) Nguyen, K.T., Laurent, M., Oualha, N.: Lightweight certificateless and provably-secure signcryptosystem for the internet of things. In: IEEE Trustcom (2015)
16.
go back to reference Nist, recommaned elliptic curves for federal government use (1999) Nist, recommaned elliptic curves for federal government use (1999)
18.
go back to reference Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology–EUROCRYPT 2005, pp. 457–473. Springer (2005) Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology–EUROCRYPT 2005, pp. 457–473. Springer (2005)
19.
go back to reference Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 2, 38–47 (1996)CrossRef Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 2, 38–47 (1996)CrossRef
20.
go back to reference Secg. sec 2: Recommended elliptic curve domain parameters version 2.0 Secg. sec 2: Recommended elliptic curve domain parameters version 2.0
21.
go back to reference Touati, L., Challal, Y., Bouabdallah, A.: C-cp-abe: cooperative ciphertext policy attribute-based encryption for the internet of things. In: IEEE INDS (2014) Touati, L., Challal, Y., Bouabdallah, A.: C-cp-abe: cooperative ciphertext policy attribute-based encryption for the internet of things. In: IEEE INDS (2014)
22.
go back to reference Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: PKC 2011, pp. 53–70. Springer (2011) Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: PKC 2011, pp. 53–70. Springer (2011)
23.
go back to reference Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. In: Proceedings of the 8th International Conference on Network and Service Management (2012) Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. In: Proceedings of the 8th International Conference on Network and Service Management (2012)
Metadata
Title
Securely outsourcing the ciphertext-policy attribute-based encryption
Authors
Kim Thuat Nguyen
Nouha Oualha
Maryline Laurent
Publication date
03-08-2017
Publisher
Springer US
Published in
World Wide Web / Issue 1/2018
Print ISSN: 1386-145X
Electronic ISSN: 1573-1413
DOI
https://doi.org/10.1007/s11280-017-0473-x

Other articles of this Issue 1/2018

World Wide Web 1/2018 Go to the issue

Premium Partner