Skip to main content
Erschienen in: World Wide Web 1/2018

03.08.2017

Securely outsourcing the ciphertext-policy attribute-based encryption

verfasst von: Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent

Erschienen in: World Wide Web | Ausgabe 1/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Attribute-based Encryption (ABE) is a new and promising public key encryption that allows fine-grained authorization on data based on user attributes. Such property is favorable for multiple applications that require encrypted storage or access control on data, in particular: eHealth applications. However, ABE schemes are known not to be efficient in the encryption phase because ciphertext size and the time required to encrypt grow with the complexity of the access policy. Such drawback is critical in the context of pervasive computing, for instance, in the Internet of Things, where data producers are usually resource-constrained devices, e.g. smart phones or sensing platforms. In this work, we propose OEABE standing for Outsourcing mechanism for the Encryption of Ciphertext-Policy ABE (CP-ABE). We show how a user can offload expensive operations of CP-ABE encryption to a semi-trusted party in a secure manner. Our proposed mechanism requires only one exponentiation on resource-constrained devices. We provide also an informal security analysis of possible attacks from a semi-honest adversary against the proposed solution. To demonstrate the performance gains of our mechanism, we first conducted a performance estimation on an emulated Wismote sensor platform. Then, we implemented our proposal and did comparison to an existing implementation of CP-ABE on a laptop.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alomair, B., Poovendran, R.: Unconditionally secure authenticated encryption with shorter keys. In: WOSIS (2009) Alomair, B., Poovendran, R.: Unconditionally secure authenticated encryption with shorter keys. In: WOSIS (2009)
2.
Zurück zum Zitat Ambrosin, M., conti, M., Dargahi, T.: On the feasibility of attribute-based encryption on smartphone devices. IoT-Sys ’15 (2015) Ambrosin, M., conti, M., Dargahi, T.: On the feasibility of attribute-based encryption on smartphone devices. IoT-Sys ’15 (2015)
3.
Zurück zum Zitat Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62–73. 1 (1993) Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62–73. 1 (1993)
4.
Zurück zum Zitat Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE S & P (2007) Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE S & P (2007)
5.
Zurück zum Zitat Bianchi, G., Capossele, A.T., Petrioli, C., Spenza, D.: Agree: exploiting energy harvesting to support data-centric access control in wsns. Ad Hoc Netw. 11(8), 2625–2636 (2013)CrossRef Bianchi, G., Capossele, A.T., Petrioli, C., Spenza, D.: Agree: exploiting energy harvesting to support data-centric access control in wsns. Ad Hoc Netw. 11(8), 2625–2636 (2013)CrossRef
6.
Zurück zum Zitat Chen, C., Zhang, Z., Feng, D.: Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost. In: Provable Security, pp. 84–101. Springer (2011) Chen, C., Zhang, Z., Feng, D.: Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost. In: Provable Security, pp. 84–101. Springer (2011)
7.
Zurück zum Zitat Cisco global cloud index: Forecast and methodology, 2014-2019 white paper Cisco global cloud index: Forecast and methodology, 2014-2019 white paper
9.
Zurück zum Zitat Dunkels, A., Grönvall, B., Voigt, T.: Contiki-a lightweight and flexible operating system for tiny networked sensors. In: IEEE LCN (2004) Dunkels, A., Grönvall, B., Voigt, T.: Contiki-a lightweight and flexible operating system for tiny networked sensors. In: IEEE LCN (2004)
10.
Zurück zum Zitat Gartner inc., Forecast: The internet of things worldwide (2013) Gartner inc., Forecast: The internet of things worldwide (2013)
11.
Zurück zum Zitat Goldreich, O.: Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press (2009) Goldreich, O.: Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press (2009)
12.
Zurück zum Zitat Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: Automata, Languages and Programming, pp. 579–591. Springer (2008) Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: Automata, Languages and Programming, pp. 579–591. Springer (2008)
13.
Zurück zum Zitat Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of abe ciphertexts. In: USENIX Security Symposium, Volume 2011 (2011) Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of abe ciphertexts. In: USENIX Security Symposium, Volume 2011 (2011)
14.
Zurück zum Zitat Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Advances in Cryptology–EUROCRYPT 2011, pp. 568–588. Springer (2011) Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Advances in Cryptology–EUROCRYPT 2011, pp. 568–588. Springer (2011)
15.
Zurück zum Zitat Nguyen, K.T., Laurent, M., Oualha, N.: Lightweight certificateless and provably-secure signcryptosystem for the internet of things. In: IEEE Trustcom (2015) Nguyen, K.T., Laurent, M., Oualha, N.: Lightweight certificateless and provably-secure signcryptosystem for the internet of things. In: IEEE Trustcom (2015)
16.
Zurück zum Zitat Nist, recommaned elliptic curves for federal government use (1999) Nist, recommaned elliptic curves for federal government use (1999)
18.
Zurück zum Zitat Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology–EUROCRYPT 2005, pp. 457–473. Springer (2005) Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology–EUROCRYPT 2005, pp. 457–473. Springer (2005)
19.
Zurück zum Zitat Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 2, 38–47 (1996)CrossRef Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 2, 38–47 (1996)CrossRef
20.
Zurück zum Zitat Secg. sec 2: Recommended elliptic curve domain parameters version 2.0 Secg. sec 2: Recommended elliptic curve domain parameters version 2.0
21.
Zurück zum Zitat Touati, L., Challal, Y., Bouabdallah, A.: C-cp-abe: cooperative ciphertext policy attribute-based encryption for the internet of things. In: IEEE INDS (2014) Touati, L., Challal, Y., Bouabdallah, A.: C-cp-abe: cooperative ciphertext policy attribute-based encryption for the internet of things. In: IEEE INDS (2014)
22.
Zurück zum Zitat Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: PKC 2011, pp. 53–70. Springer (2011) Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: PKC 2011, pp. 53–70. Springer (2011)
23.
Zurück zum Zitat Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. In: Proceedings of the 8th International Conference on Network and Service Management (2012) Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. In: Proceedings of the 8th International Conference on Network and Service Management (2012)
Metadaten
Titel
Securely outsourcing the ciphertext-policy attribute-based encryption
verfasst von
Kim Thuat Nguyen
Nouha Oualha
Maryline Laurent
Publikationsdatum
03.08.2017
Verlag
Springer US
Erschienen in
World Wide Web / Ausgabe 1/2018
Print ISSN: 1386-145X
Elektronische ISSN: 1573-1413
DOI
https://doi.org/10.1007/s11280-017-0473-x

Weitere Artikel der Ausgabe 1/2018

World Wide Web 1/2018 Zur Ausgabe