Constant Size CP-ABE with Scalable Revocation for Resource-Constrained IoT Devices

Users can directly access and share information from portable devices such as a smartphone or an Internet of Things (IoT) device. However, to prevent them from becoming victims to launch cyber attacks, they must allow selective sharing based on roles of the users such as with the Ciphertext-Policy Attribute Encryption (CP-ABE) scheme. However, to match the resource constraints, the scheme must be efficient for storage. It must also protect the device from malicious users as well as allow uninterrupted access to valid users. This paper presents the CCA secure PROxy-based Scalable Revocation for Constant Cipher-text (C-PROSRCC) scheme, which provides scalable revocation for a constant ciphertext length CP-ABE scheme. The scheme has a constant number of pairings and computations. It can also revoke any number of users and does not require re-encryption or redistribution of keys. We have successfully implemented the C-PROSRCC scheme. The qualitative and quantitative comparison with related schemes indicates that C-PROSRCC performs better with acceptable overheads. C-PROSRCC is Chosen Ciphertext Attack (CCA) secure. We also present a case study to demonstrate the use of C-PROSRCC for mobile-based selective sharing of a family car.

[1]  Ling Cheung,et al.  Provably secure ciphertext policy ABE , 2007, CCS '07.

[2]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[3]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[4]  Nikita Borisov,et al.  PIRATTE: Proxy-based Immediate Revocation of ATTribute-based Encryption , 2012, ArXiv.

[5]  Daya Gupta,et al.  Smart health record management with secure NFC-enabled mobile devices , 2019 .

[6]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[7]  Daya Gupta,et al.  CP-ABE for Selective Access with Scalable Revocation: A Case Study for Mobile-based Healthfolder , 2018, Int. J. Netw. Secur..

[8]  Tooska Dargahi,et al.  On the Feasibility of Attribute-Based Encryption on Internet of Things Devices , 2016, IEEE Micro.

[9]  Daya Gupta,et al.  NFC Secure Element-Based Mutual Authentication and Attestation for IoT Access , 2018, IEEE Transactions on Consumer Electronics.

[10]  Liaojun Pang,et al.  A Survey of Research Progress and Development Tendency of Attribute-Based Encryption , 2014, TheScientificWorldJournal.

[11]  Atsuko Miyaji,et al.  A ciphertext-policy attribute-based encryption scheme with constant ciphertext length , 2009, Int. J. Appl. Cryptogr..

[12]  Kim-Kwang Raymond Choo,et al.  Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts , 2017, IEEE Access.