2020
DOI: 10.1155/2020/8861114
|View full text |Cite
|
Sign up to set email alerts
|

Offline/Online Outsourced Attribute-Based Encryption with Partial Policy Hidden for the Internet of Things

Abstract: In the Internet of Things (IoT) environment, the intelligent devices collect and share large-scale sensitive personal data for a wide range of application. However, the power of storage and computing of IoT devices is limited, so the mass perceived data will be encrypted and transmitted to a cloud platform-interconnected IoT devices. Therefore, the concern how to save the encryption/decryption cost and preserve the privacy of the sensitive data in IoT environment is an issue that deserves research. To mitigate… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(15 citation statements)
references
References 30 publications
0
14
0
Order By: Relevance
“…Its essence is to replace the original attribute value with a wider range of fuzzy values, so as to realize the fuzzy replacement of data without violating the original semantics. Although the generalization operation will reduce the data accuracy, it fully realizes the role of protecting privacy [1].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Its essence is to replace the original attribute value with a wider range of fuzzy values, so as to realize the fuzzy replacement of data without violating the original semantics. Although the generalization operation will reduce the data accuracy, it fully realizes the role of protecting privacy [1].…”
Section: Literature Reviewmentioning
confidence: 99%
“…This paper is an extended version of a conference paper published in [1]. We extend our previous work by expanding system architecture, improving the related cryptographic structures, evaluating performance based on the LSSS [19] AND-gates Fully [20] LSSS [21] AND-gates [25] LSSS - [26] LSSS - [31] LSSS Partially [32] LSSS Partially - [38] LSSS [39] LSSS [40] LSSS Partially - [41] LSSS Partially - [42] AND-gates Fully -HUAP AND-gates Fully actual execution time, and providing security proof in detail.…”
Section: Related Workmentioning
confidence: 91%
“…On the other hand, some other schemes have been proposed to simultaneously support anonymity and online/offline encryption. Yan et al [40] proposed an attribute-based encryption scheme with partially hidden policies for the Internet of Things. In this scheme, data users can outsource the decryption process to the cloud and then verify returned results.…”
Section: Related Workmentioning
confidence: 99%
“…However, the probability of correct verification in their approach is only 1/2. Yan et al [ 44 ] improved the modular exponentiation outsourcing algorithm based on the work of Li et al [ 43 ] and applied it to the encryption and decryption phases of ciphertext-policy attribute-based encryption, increasing the verifiability probability to 1.…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, while offloading some computational tasks to more powerful devices or cloud servers, as explored in Refs. [ [40] , [41] , [42] , [43] , [44] ], can alleviate the computational burden on resource-constrained devices, achieving efficient CP-ABE computations in edge environment while ensuring computational correctness remains an urgent challenge.…”
Section: Related Workmentioning
confidence: 99%