Title | Online/Offline Revocable Multi-Authority Attribute-Based Encryption for Edge Computing |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Huang, K. |
Conference Name | 2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA) |
Keywords | authorisation, ciphertext verification, Ciphertext Verification., cloud computing, composability, cross domain applications, cryptography, cyber physical systems, data encryption algorithm, edge computing, efficient encryption, encryption computational cost, fine-grained access control, illegal ciphertext, Internet of Things, invalid ciphertext, IoT, large universe MA-CP-ABE scheme, Multi-Authority Attribute-Based Encryption, online-offline revocable multiauthority attribute-based encryption, Online/Offline Encryption, pubcrawl, q-DPBDHE2 assumption, Resiliency, resource-constrained users, reusable ciphertext pool, revocation, revocation mechanism, security problems, users access privilege, users initialization phase, valid ciphertext, waste system resources |
Abstract | Multi-authority attribute-based encryption (MA-ABE) is a promising technique to achieve fine-grained access control over encrypted data in cross domain applications. However, the dynamic change of users' access privilege brings security problems, and the heavy encryption computational cost is issue for resource-constrained users in IoT. Moreover, the invalid or illegal ciphertext will waste system resources. We propose a large universe MA-CP-ABE scheme with revocation and online/offline encryption. In our scheme, an efficient revocation mechanism is designed to change users' access privilege timely. Most of the encryption operations have been executed in the user's initialization phase by adding reusable ciphertext pool besides splitting the encryption algorithm to online encryption and offline encryption. Moreover, the scheme supports ciphertext verification and only valid ciphertext can be stored and transmitted. The proposed scheme is proven statically secure under the q-DPBDHE2 assumption. The performance analysis results indicate that the proposed scheme is efficient and suitable for resource constrained users in edge computing for IoT. |
DOI | 10.1109/ICMTMA50254.2020.00126 |
Citation Key | huang_onlineoffline_2020 |