Visible to the public Constant Size CP-ABE with Scalable Revocation for Resource-Constrained IoT Devices

TitleConstant Size CP-ABE with Scalable Revocation for Resource-Constrained IoT Devices
Publication TypeConference Paper
Year of Publication2019
AuthorsSethia, Divyashikha, Shakya, Anadi, Aggarwal, Ritik, Bhayana, Saksham
Conference Name2019 IEEE 10th Annual Ubiquitous Computing, Electronics Mobile Communication Conference (UEMCON)
Date PublishedOct. 2019
PublisherIEEE
ISBN Number978-1-7281-3885-5
Keywordsauthorisation, C-PROSRCC scheme, CCA secure proxy-based scalable revocation, CCA-secure, chosen ciphertext attack secure, ciphertext-policy attribute encryption scheme, Collaboration, constant cipher-text, constant ciphertext, constant ciphertext length CP-ABE scheme, constant number, constant size CP-ABE, CP-ABE, cryptography, Internet of Things, Internet of Things device, IoT, malicious users, mobile computing, mobile-based selective sharing, policy-based governance, portable devices, pubcrawl, related schemes, resource constraints, resource-constrained IoT devices, Scalability, scalable revocation, valid users
Abstract

Users can directly access and share information from portable devices such as a smartphone or an Internet of Things (IoT) device. However, to prevent them from becoming victims to launch cyber attacks, they must allow selective sharing based on roles of the users such as with the Ciphertext-Policy Attribute Encryption (CP-ABE) scheme. However, to match the resource constraints, the scheme must be efficient for storage. It must also protect the device from malicious users as well as allow uninterrupted access to valid users. This paper presents the CCA secure PROxy-based Scalable Revocation for Constant Cipher-text (C-PROSRCC) scheme, which provides scalable revocation for a constant ciphertext length CP-ABE scheme. The scheme has a constant number of pairings and computations. It can also revoke any number of users and does not require re-encryption or redistribution of keys. We have successfully implemented the C-PROSRCC scheme. The qualitative and quantitative comparison with related schemes indicates that C-PROSRCC performs better with acceptable overheads. C-PROSRCC is Chosen Ciphertext Attack (CCA) secure. We also present a case study to demonstrate the use of C-PROSRCC for mobile-based selective sharing of a family car.

URLhttps://ieeexplore.ieee.org/document/8993103
DOI10.1109/UEMCON47517.2019.8993103
Citation Keysethia_constant_2019