Distributed attribute-based encryption with small ciphertext

Distributed attribute-based encryption with small ciphertext

Authors

  • Hiromu Komazawa, Tomofumi Matsuzawa

Keywords:

Cloud Computing, Cloud Security, Attribute-based Encryption

Abstract

Currently, cloud services are widely used to manage data. Hence protecting their security is extremely im-portant. This requires meticulous control of access rights for viewers, especially for confidential corporate data in the cloud. Attribute-based encryption (ABE) is a next-generation cryptographic technique that can efficiently control access rights by associating decryption conditions based on the attributes of a given viewer with a ciphertext to allow only viewers who satisfy the decryption conditions. However, ABE requires a key generator, which is an organization that generates users public and private keys with sufficient authority to decrypt the ciphertext. To solve this security problem, distributed ABE (DABE) methods without decrypt-able institutions have been presented.DABE also involves a problem that the more ORs in the decryption condition, the larger the ciphertext size becomes, which is a major challenge for practical use. In this study, we propose a DABE method with reduced ciphertext size and processing load without the need for an au-thority that can decrypt ciphertext. To this end, based on DABE, we adopt a multi-value attribute algorithm with attributes as a set with restrictions on decryption conditions. The results of a security evaluation are presented to show that the security strength of the proposed method is equivalent to that of the existing DABE  scheme. Furthermore, the increase in ciphertext size was greatly reduced, which was a major issue for the existing DABE.We also confirmed that the proposed method performed better in terms of decryption time under certain conditions. This research contributes to the development of ABE by realizing a highly practical implementation with both efficient processing and strong capabilities.

References

Joseph K. Liu, X.Huang, R.Lu, J.Li, Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services, IEEE Transactions on Information Forensics and Security Vol. 11 (2016), No. 3, 484-497.

Qijun G., Liu P., Lee W.-C., Chu C., KTR: An efficient key management scheme for secure data access control in wireless broadcast services, IEEE Transactions on Dependable and Secure Computing Vol. 6 (2009), No. 3, 188-201.

V.Goyal, O.Pandey, A.Sahai, B.Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proc. of the 13th ACM conference on Computer and communications securityCCS’06 (2006), 89-98.

J.Bethencourt, A.Sahai, B.Waters, Ciphertext-Policy Attribute-Based Encryption, Proc. of the 2007 IEEE Symposium on Security and Privacy (2007), 321-334.

C.Guo, R.Zhuang, Y.Jie, Y.Ren, T.Wu, K.Choo, Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds, J Med Syst Vol. 40 (2016), No. 235, 1-8.

John P.Papanis, Stavros I.Papapanagiotou, Aziz S.Mousas, Georgios V.Lioudakis, Dimitra I.Kaklamani, Iakovos S.Venieris, On the use of Attribute-Based Encryption for multimedia content protection over Information-Centric Networks, Special Issue: Information-Centric Networking for Multimedia, Social and Peer-to-Peer Communications (2014), 422-435.

Z.Guo, G.Wang, Y.Li, J.Ni, R.Du, M.Wang, Accountable Attribute-Based Data Sharing Scheme Based on Blockchain for Vehicular Ad Hoc Network, Proc. of the 2022 IEEE Internet of Things Journal (2022), 1-1.

A.Ghorbel, M.Ghorbel, M.Jmaiel, Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain, IJIS Security 21 (2022), 489-508.

S.Müller, S.Katzenbeisser, C.Eckert, Distributed Attribute-Based Encryption, Proc. of ICISC’08 LNCS 5461 (2009), 20-36.

G. Ohtake, Y. Doi, Attribute-based encryption with arbitrary number of authoritiesAttribute-based encryption with arbi-trary number of authorities, IEICE technical report (2010), 153-158.

K. Ogawa, G. Ohtake, G. Hanaoka, S. Yamada, K.Kasamatsu, T. Yamakawa, H. Imai, Partially Wildcarded Ciphertext-Policy Attribute-BasedEncryption and Its Performance Evaluation, IEICE Trans. Fundamentals Vol. E100-A (2017), No. 9, 1846-1856.

A.Saidi, O.Nouali, A.Amira, SHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing Cluster Computing 25 (2022), 167-185.

A. Lewko, T. Okamoto, A. Sahai, K. Takashima, B. Waters, Fully Secure Functional Encryption: Attribute-based Encryp-tion and (Hierarchical) Inner Product Encryption, Proc. of Eurocrypt’10 LNCS 6110 (2010), 62-91.

S.Zhao, R.Jiang, B.Bhargava, RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Prob-lem in Cloud Storage, IEEE Transactions on Services Computing Vol. 15 (2022), No. 2, 1026-1035

Downloads

Published

2023-11-07

Issue

Section

Articles

How to Cite

Distributed attribute-based encryption with small ciphertext. (2023). Advances in the Theory of Nonlinear Analysis and Its Application, 7(3), 30-44. https://doi.org/10.17762/atnaa.v7.i3.248