Blockchain-Based CP-ABE with Publicly Verifiable Outsourced Decryption in IoT

作者: Mande Xie , Jifei Hu , Haibo Hong

DOI: 10.1007/978-981-15-9739-8_1

关键词:

摘要: Attribute based encryption (ABE) was used to ensure confidentiality and access control in IoT as a preeminent cryptographic primitive. However, the traditional ABE with outsourced decryption cannot achieve public verifiability for results. In this paper, blockchain technology is appplied realize publicly our CP-ABE scheme. Furthermore, scheme has many characteristics: white box traceability, malicious users revocability updatability of ciphertext. Lastly, we present security analysis demonstrate performance The results show that IND-CPA secure under standard model also high efficiency.

参考文章(24)
Brent Waters, Susan Hohenberger, Matthew Green, Outsourcing the decryption of ABE ciphertexts usenix security symposium. pp. 34- 34 ,(2011)
Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, Xiaodong Lin, Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability european symposium on research in computer security. pp. 55- 72 ,(2014) , 10.1007/978-3-319-11212-1_4
Zhen Liu, Duncan S. Wong, Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe The Computer Journal. ,vol. 59, pp. 983- 1004 ,(2016) , 10.1093/COMJNL/BXV101
Amit Sahai, Brent Waters, Fuzzy identity-based encryption theory and application of cryptographic techniques. ,vol. 3494, pp. 457- 473 ,(2005) , 10.1007/11426639_27
Debasis Bandyopadhyay, Jaydip Sen, Internet of Things: Applications and Challenges in Technology and Standardization Wireless Personal Communications. ,vol. 58, pp. 49- 69 ,(2011) , 10.1007/S11277-011-0288-5
Junzuo Lai, Robert H Deng, Chaowen Guan, Jian Weng, None, Attribute-Based Encryption With Verifiable Outsourced Decryption IEEE Transactions on Information Forensics and Security. ,vol. 8, pp. 1343- 1354 ,(2013) , 10.1109/TIFS.2013.2271848
Zhen Liu, Zhenfu Cao, D. S. Wong, White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures IEEE Transactions on Information Forensics and Security. ,vol. 8, pp. 76- 88 ,(2013) , 10.1109/TIFS.2012.2223683
Rongxing Lu, Hui Zhu, Ximeng Liu, Joseph K Liu, Jun Shao, None, Toward efficient and privacy-preserving computing in big data era IEEE Network. ,vol. 28, pp. 46- 50 ,(2014) , 10.1109/MNET.2014.6863131
Jin Li, Xinyi Huang, Jingwei Li, Xiaofeng Chen, Yang Xiang, Securely Outsourcing Attribute-Based Encryption with Checkability IEEE Transactions on Parallel and Distributed Systems. ,vol. 25, pp. 2201- 2210 ,(2014) , 10.1109/TPDS.2013.271
John Bethencourt, Amit Sahai, Brent Waters, Ciphertext-Policy Attribute-Based Encryption ieee symposium on security and privacy. pp. 321- 334 ,(2007) , 10.1109/SP.2007.11