Visible to the public Online/Offline Revocable Multi-Authority Attribute-Based Encryption for Edge Computing

TitleOnline/Offline Revocable Multi-Authority Attribute-Based Encryption for Edge Computing
Publication TypeConference Paper
Year of Publication2020
AuthorsHuang, K.
Conference Name2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)
Keywordsauthorisation, ciphertext verification, Ciphertext Verification., cloud computing, composability, cross domain applications, cryptography, cyber physical systems, data encryption algorithm, edge computing, efficient encryption, encryption computational cost, fine-grained access control, illegal ciphertext, Internet of Things, invalid ciphertext, IoT, large universe MA-CP-ABE scheme, Multi-Authority Attribute-Based Encryption, online-offline revocable multiauthority attribute-based encryption, Online/Offline Encryption, pubcrawl, q-DPBDHE2 assumption, Resiliency, resource-constrained users, reusable ciphertext pool, revocation, revocation mechanism, security problems, users access privilege, users initialization phase, valid ciphertext, waste system resources
AbstractMulti-authority attribute-based encryption (MA-ABE) is a promising technique to achieve fine-grained access control over encrypted data in cross domain applications. However, the dynamic change of users' access privilege brings security problems, and the heavy encryption computational cost is issue for resource-constrained users in IoT. Moreover, the invalid or illegal ciphertext will waste system resources. We propose a large universe MA-CP-ABE scheme with revocation and online/offline encryption. In our scheme, an efficient revocation mechanism is designed to change users' access privilege timely. Most of the encryption operations have been executed in the user's initialization phase by adding reusable ciphertext pool besides splitting the encryption algorithm to online encryption and offline encryption. Moreover, the scheme supports ciphertext verification and only valid ciphertext can be stored and transmitted. The proposed scheme is proven statically secure under the q-DPBDHE2 assumption. The performance analysis results indicate that the proposed scheme is efficient and suitable for resource constrained users in edge computing for IoT.
DOI10.1109/ICMTMA50254.2020.00126
Citation Keyhuang_onlineoffline_2020