CP-ABE With Constant-Size Keys for Lightweight Devices
- 5 March 2014
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Information Forensics and Security
- Vol. 9 (5), 763-771
- https://doi.org/10.1109/tifs.2014.2309858
Abstract
Lightweight devices, such as radio frequency identification tags, have a limited storage capacity, which has become a bottleneck for many applications, especially for security applications. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic tool, where the encryptor can decide the access structure that will be used to protect the sensitive data. However, current CP-ABE schemes suffer from the issue of having long decryption keys, in which the size is linear to and dependent on the number of attributes. This drawback prevents the use of lightweight devices in practice as a storage of the decryption keys of the CP-ABE for users. In this paper, we provide an affirmative answer to the above long standing issue, which will make the CP-ABE very practical. We propose a novel CP-ABE scheme with constant-size decryption keys independent of the number of attributes. We found that the size can be as small as 672 bits. In comparison with other schemes in the literature, the proposed scheme is the only CP-ABE with expressive access structures, which is suitable for CP-ABE key storage in lightweight devices.Keywords
This publication has 16 references indexed in Scilit:
- White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access StructuresIEEE Transactions on Information Forensics and Security, 2012
- Efficient and dynamic key management for multiple identities in identity-based systemsInformation Sciences, 2012
- Identity-Based Traitor Tracing with Short Private Key and Short CiphertextLecture Notes in Computer Science, 2012
- Attribute-based encryption without key cloningInternational Journal of Applied Cryptography, 2012
- HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud ComputingIEEE Transactions on Information Forensics and Security, 2011
- On efficient ciphertext-policy attribute based encryption and broadcast encryptionPublished by Association for Computing Machinery (ACM) ,2010
- A Taxonomy of Pairing-Friendly Elliptic CurvesJournal of Cryptology, 2009
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access StructuresLecture Notes in Computer Science, 2008
- Multi-authority Attribute Based EncryptionPublished by Springer Nature ,2007
- Attribute-based encryption for fine-grained access control of encrypted dataPublished by Association for Computing Machinery (ACM) ,2006