Verifiable Outsourced Attribute Based Encryption Scheme with Fixed Key Size

The limited storage capacity of small devices, such as mobile phone, has become a bottleneck for the development of many application, especially for security applications. The Ciphertext Policy Attributes Based-Encryption (CP-ABE) is a promising cryptographic scheme that allows encryption to choose an access structure that protects sensitive data. However, one of the problems with current CP-ABE scheme is the length of the key, whose size increases linearly with the number of attributes. In this paper, we propose a CP-ABE scheme for a constant size key. By modifying the modulus index in the key generation algorithm, the computational cost is reduced to a constant. Compared with other schemes for the literature, the private key is independent of the number of attributes.

[1]  Matthew Green,et al.  Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.

[2]  Robert H. Deng,et al.  Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption , 2015, IEEE Transactions on Information Forensics and Security.

[3]  Nik Bessis,et al.  CS-PSO: chaotic particle swarm optimization algorithm for solving combinatorial optimization problems , 2016, Soft Computing.

[4]  Jin Li,et al.  Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.

[5]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[6]  Robert H. Deng,et al.  Adaptable Ciphertext-Policy Attribute-Based Encryption , 2013, Pairing.

[7]  Amit Sahai,et al.  Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.

[8]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[9]  Zhou Su,et al.  An Efficient and Fine-Grained Big Data Access Control Scheme With Privacy-Preserving Policy , 2017, IEEE Internet of Things Journal.

[10]  Derong Liu,et al.  Optimization of electricity consumption in office buildings based on adaptive dynamic programming , 2017, Soft Comput..

[11]  Jing Li,et al.  Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption , 2017, Soft Computing.

[12]  Hao Wang,et al.  Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing , 2016, Soft Computing.

[13]  Jin Li,et al.  Outsourcing Encryption of Attribute-Based Encryption with MapReduce , 2012, ICICS.

[14]  Zhibin Zhou,et al.  Efficient and secure data storage operations for mobile cloud computing , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).

[15]  Liu Meng-ju Optimizing the Decryption Efficiency in LSSS Matrix-Based Attribute-Based Encryption Without Given Policy , 2015 .

[16]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.