4.2 Article

Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation

出版社

SPRINGER HEIDELBERG
DOI: 10.1007/s12652-017-0658-2

关键词

-

资金

  1. National Key Research and Development Program of China [2017YFB0802000]
  2. National Natural Science Foundation of China [61572390, U1736111]
  3. Natural Science Foundation of Ningbo City [201601HJ-B01382]
  4. Open Foundation of Key Laboratory of Cognitive Radio and Information Processing, Ministry of Education (Guilin University of Electronic Technology) [CRKL160202]
  5. National Cryptography Development Fund of China [MMJJ20170112]
  6. National Nature Science Foundation of China [61572521, 61772550, U1636114, 61402531]
  7. Natural Science Basic Research Plan in Shaanxi Province of china [2016JQ6037]
  8. Guangxi Key Laboratory of Cryptography and Information Security [GCIS201610]

向作者/读者索取更多资源

In this paper two new ways for efficient secure outsourcing the decryption of key-policy attribute-based encryption (KP-ABE) with energy efficiency are proposed. Based on an observation about the permutation property of the access structure for the attribute based encryption schemes, we propose a high efficient way for outsourcing the decryption of KP-ABE, which is suitable for being used in mobile devices. But it can only be used for the ABE schemes having tree-like access structure for the self-enclosed system. The second way is motivated from the fact that almost all the previous work on outsourcing the decryption of KP-ABE cares little about the ciphertext length. Almost all the previous schemes for secure outsourcing the decryption of ABE have linear length ciphertext with the attributes or the policy. But transferring so long ciphertexts via wireless network for mobile phone can easily run out of battery power, therefore it can not be adapted to practical application scenarios. Thus another new scheme for outsourcing the decryption of ABE but with constant-size ciphertexts is proposed. Furthermore, our second proposal gives a new efficient way for secure outsourcing the decryptor's secret key to the cloud, which need only one modular exponentiation while all the previous schemes need many. We evaluate the efficiency of our proposals and the results show that our proposals are practical.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.2
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据