Efficient Revocable Attribute-Based Encryption with Hidden Policies

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

Abstract

We present a novel Ciphertext-Policy Attribute-Based Encryption (CP-ABE) scheme, which bridges the gap between highly dynamic (industrial) environments and resource-constrained devices. Our construction combines outsourced-decryption, hidden policies and revocation to cope with the requirements posed by such environments. In contrast to existing schemes, which typically rely on composite order bilinear groups, we present a scheme in prime order groups. The resulting scheme is more efficient as it relies on smaller group orders. We prove our scheme is secure under the Symmetric External Diffie-Hellman (SXDH) assumption. Lastly, we compare our scheme against existing schemes and provide timing results of our software implementation. Our evaluation shows that the proposed scheme is flexible enough for the targeted environment while improving performance by an order of magnitude.

Originalspracheenglisch
TitelProceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020
Redakteure/-innenGuojun Wang, Ryan Ko, Md Zakirul Alam Bhuiyan, Yi Pan
Seiten1638-1645
Seitenumfang8
ISBN (elektronisch)9780738143804
DOIs
PublikationsstatusVeröffentlicht - Dez 2020
VeranstaltungThe 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications - Guangdong Hotel, Hybrider Event, Guangzhou, China
Dauer: 29 Dez 20201 Jan 2021
http://ieee-trustcom.org/TrustCom2020/

Publikationsreihe

NameProceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020

Konferenz

KonferenzThe 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
KurztitelIEEE TrustCom 2020
LandChina
OrtHybrider Event, Guangzhou
Zeitraum29/12/201/01/21
Internetadresse

ASJC Scopus subject areas

  • Software
  • !!Information Systems and Management
  • !!Safety, Risk, Reliability and Quality
  • !!Computer Networks and Communications

Fingerprint Untersuchen Sie die Forschungsthemen von „Efficient Revocable Attribute-Based Encryption with Hidden Policies“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren