Attribute-based Encryption Scheme with Fast Encryption
Author:
Affiliation:

Fund Project:

National Natural Science Foundation of China (61373163); National Key Technology Research and Development Program of theMinistry of Science and Technology of China (2014BAH11F02); Science and Technology Support Program of Sichuan Province (2015GZ079); Postgraduate Excellent Paper Cultivation Fund of Sichuan Normal University (Chuan Shi Yan [2018] No.3-38); Project of Key Laboratory of National Defense Science and Technology (6142103010709)

  • Article
  • | |
  • Metrics
  • |
  • Reference [24]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    Attribute-based encryption algorithm contains a large number of time-consuming exponential operations and bilinear pairing operations, therefore, some schemes propose to outsource encryption to the cloud server. However, these schemes do not provide the parallel computing method of outsourcing encryption on cloud servers. Besides, in these schemes, user manages too many private keys and the authorization center generates a private key for the user with excessive cost. To solve these problems, a fast encryption and sharing scheme based on the Spark big data platform is proposed. In this scheme, an encryption parallelization algorithm is designed according to the characteristics of the sharing access tree, with which, distribution of secret value of the sharing access tree and encryption at leaf node are parallelized. Then, the parallelization tasks are handed over to the Spark cluster. As a result, user client needs only one exponent operation for each leaf node. In addition to this, the private key attribute computation is also outsourced to the Spark cluster. In proposed scheme, the authorization center generates a user private key requiring only four exponential and users only need to save a key sub-item with small space.

    Reference
    [1] Ghemawat S, Gobioff H, Leung ST. The Google file system. In:Juels A, Wright RN, Vimercati SDC, eds. Proc. of the 19th ACM Symp. on Operating Systems Principles. Alexandria:ACM, 2003. 29-43.[doi:10.1145/945445.945450]
    [2] Sahai A, Waters B. Fuzzy identity based encryption. In:Proc. of the Advances in Cryptology, Eurocrypt. LNCS:Springer-Verlag, 2005. 457-473.[doi:10.1007/11426639_27]
    [3] Lee CC, Chung PS, Hwang MS. A survey on attribute-based encryption schemes of access control in cloud environments. Int'l Journal of Network Security, 2013,15(4):231-240.
    [4] Qiao Z, Liang SW, Davis S, Jiang H. Survey of attribute based encryption. In:Proc. IEEE/ACIS Int'l Conf. on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing. Austria:IEEE, 2014. 1-6.[doi:10.1109/SNPD.2014.6888687]
    [5] Feng CS, Qin ZG, Yuan D. Techniques of secure storage for cloud data. Chinese Journal of Computers, 2015,38(1):150-163(in Chinese with English abstract).
    [6] Feng CS, Qin ZG, Yuan D, Qing Y. Key techniques of access control for cloud computing. Acta Electronica Sinica, 2015,43(2):312-319(in Chinese with English abstract).
    [7] Goyal V, Pandey A, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In:Juels A, Wright RN, Vimercati SDC, eds. Proc. of the 13th ACM Conf. on Computer and Communications Security (CCS 2006). Alexandria:ACM, 2006. 89-98.
    [8] Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In:Proc. of the 2007 IEEE Symp. on Security and Privacy. Washington:IEEE Computer Society, 2007. 321-334.[doi:10.1109/SP.2007.11]
    [9] Dan B, Franklin M. Identity-Based encryption from the Weil pairing. SIAM Journal on Computing, 2003,32(3):586-615.[doi:10.1137/S0097539701398521]
    [10] Dan B, Lynn B, Shacham H. Short signatures from the Weil pairing. Journal of Cryptology, 2004,17(4):297-319.[doi:10.1007/s00145-004-0314-9]
    [11] Green M, Hohenberger S, Waters B. Outsourcing the decryption of ABE ciphertexts. In:Proc. of the 20th Usenix Conf. on Security. San Francisco:ACM, 2011.
    [12] Beimel A. Secure schemes for secret sharing and key distribution[Ph.D. Thesis]. Haifa:Israel Institute of Technology, 1996.
    [13] Karchmer M, Wigderson A. On span programs. In:Proc. of the Structure in Complexity Theory Conf. San Diego:Springer-Verlag, 1993. 102-111.[doi:10.1109/SCT.1993.336536]
    [14] Waters B. Ciphertext-Policy attribute-based encryption:An expressive, efficient, and provably secure realization. In:Proc. of the Public Key Cryptography (PKC 2011). Berlin:Springer-Verlag, 2011. 53-70.[doi:10.1007/978-3-642-19379-8_4]
    [15] Zhou Z, Huang D. Efficient and secure data storage operations for mobile cloud computing. In:Proc. of the 8th Int'l Conf. on Network and Service Management. Austria:IEEE, 2012. 37-45.
    [16] Li JW, Jia CF, Li J, Chen XF. Outsourcing encryption of attribute-based encryption with MapReduce. In:Proc. of the 14th Int'l Conf. on Information and Communications Security. Berlin:Springer-Verlag, 2012. 191-201.[doi:10.1007/978-3-642-34129-8_17]
    [17] Lai J, Deng RH, Guan C, Weng J. Attribute-Based encryption with verifiable outsourced decryption. IEEE Trans. on Information Forensics and Security, 2013,8(8):1343-1354.
    [18] Qin B, Deng R, Liu S, Ma S. Attribute-Based encryption with efficient verifiable outsourced decryption. IEEE Trans. on Information Forensics and Security, 2015,10(7):1384-1393.
    [19] Lin S, Zhang R, Ma H, Wang M. Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans. on Information Forensics & Security, 2015,10(10):2119-2130.
    [20] Huang Q, Yang Y, Wang L. Secure data access control with ciphertext update and computation outsourcing in fog computing for Internet of things. IEEE Access, 2017,5(99):12941-12950.
    [21] Canetti R, Krawczyk H, Nielsen JB. Relaxing chosen-ciphertext security. In:Boneh D, ed. Proc. of the Annual Int'l Cryptology Conf. Berlin:Heidelberg, 2003. 565-582.
    附中文参考文献:
    [5] 冯朝胜,秦志光,袁丁.云数据安全存储技术.计算机学报,2015,38(1):150-163.
    [6] 冯朝胜,秦志光,袁丁,卿昱.云计算环境下访问控制关键技术.电子学报,2015,43(2):312-319.
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

罗王平,冯朝胜,邹莉萍,袁丁,吴唐美,李敏,王广杰.一种支持快速加密的基于属性加密方案.软件学报,2020,31(12):3923-3936

Copy
Share
Article Metrics
  • Abstract:1384
  • PDF: 3613
  • HTML: 1452
  • Cited by: 0
History
  • Received:April 02,2018
  • Revised:August 30,2018
  • Online: December 03,2020
  • Published: December 06,2020
You are the first2038006Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063