2018
DOI: 10.1016/j.comnet.2018.01.036
|View full text |Cite
|
Sign up to set email alerts
|

PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT

Abstract: Attribute based encryption (ABE) is an encrypted access control mechanism that ensures efficient data sharing among dynamic group of users. Nevertheless, this encryption technique presents two main drawbacks, namely high decryption cost and publicly shared access policies, thus leading to possible users' privacy leakage. In this paper, we introduce PHOABE, a Policy-Hidden Outsourced ABE scheme. Our construction presents several advantages. First, it is a multi-attribute authority ABE scheme. Second, the expens… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
117
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2
1

Relationship

3
6

Authors

Journals

citations
Cited by 149 publications
(119 citation statements)
references
References 58 publications
0
117
0
2
Order By: Relevance
“…Indeed, as shown by Table 1, our contribution introduces a ciphertext size which is independent from the size of the used access policy. Attribute based techniques have been implemented in resources-constrained devices in several research works [3,8]. Based on our on going-implementation, we deduce that in Data SignCrypt phase, the computation overhead raises linearly with the size of the access signing predicate (t s ) (c.f., Figure 3), due to the execution of aggreg [6] during the sign algorithm.…”
Section: Performance Analysismentioning
confidence: 94%
See 1 more Smart Citation
“…Indeed, as shown by Table 1, our contribution introduces a ciphertext size which is independent from the size of the used access policy. Attribute based techniques have been implemented in resources-constrained devices in several research works [3,8]. Based on our on going-implementation, we deduce that in Data SignCrypt phase, the computation overhead raises linearly with the size of the access signing predicate (t s ) (c.f., Figure 3), due to the execution of aggreg [6] during the sign algorithm.…”
Section: Performance Analysismentioning
confidence: 94%
“…are outsourced to a semi-trusted device, with sufficient computation capacities [3]. As such, only a few number of exponentiations and multiplication is required by each single IoT device.…”
Section: Data Signcrypt Phasementioning
confidence: 99%
“…In recent years, a number of novel ABE schemes have been proposed with distinct security features [6][7][8][9]. Moreover, specialized ABE schemes for various application scenarios such as cloud computing [10][11][12], social networks [13], Internet of things (IoT) [14][15][16], blockchains [17,18], and mobile computing [19,20], have been proposed.…”
Section: Introductionmentioning
confidence: 99%
“…However, this technology introduced a wide range of security threats that has not been addressed in the classical information and network security research [3], [4], [5], [6], [7], [8], [9]. Radio Frequency Identification (RFID) has exponentially and increasingly become more in-demand with major companies now incorporating RFID into their technology.…”
Section: Introductionmentioning
confidence: 99%