Constant Size CP-ABE with Scalable Revocation for Resource-Constrained IoT Devices
Title | Constant Size CP-ABE with Scalable Revocation for Resource-Constrained IoT Devices |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Sethia, Divyashikha, Shakya, Anadi, Aggarwal, Ritik, Bhayana, Saksham |
Conference Name | 2019 IEEE 10th Annual Ubiquitous Computing, Electronics Mobile Communication Conference (UEMCON) |
Date Published | Oct. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-3885-5 |
Keywords | authorisation, C-PROSRCC scheme, CCA secure proxy-based scalable revocation, CCA-secure, chosen ciphertext attack secure, ciphertext-policy attribute encryption scheme, Collaboration, constant cipher-text, constant ciphertext, constant ciphertext length CP-ABE scheme, constant number, constant size CP-ABE, CP-ABE, cryptography, Internet of Things, Internet of Things device, IoT, malicious users, mobile computing, mobile-based selective sharing, policy-based governance, portable devices, pubcrawl, related schemes, resource constraints, resource-constrained IoT devices, Scalability, scalable revocation, valid users |
Abstract | Users can directly access and share information from portable devices such as a smartphone or an Internet of Things (IoT) device. However, to prevent them from becoming victims to launch cyber attacks, they must allow selective sharing based on roles of the users such as with the Ciphertext-Policy Attribute Encryption (CP-ABE) scheme. However, to match the resource constraints, the scheme must be efficient for storage. It must also protect the device from malicious users as well as allow uninterrupted access to valid users. This paper presents the CCA secure PROxy-based Scalable Revocation for Constant Cipher-text (C-PROSRCC) scheme, which provides scalable revocation for a constant ciphertext length CP-ABE scheme. The scheme has a constant number of pairings and computations. It can also revoke any number of users and does not require re-encryption or redistribution of keys. We have successfully implemented the C-PROSRCC scheme. The qualitative and quantitative comparison with related schemes indicates that C-PROSRCC performs better with acceptable overheads. C-PROSRCC is Chosen Ciphertext Attack (CCA) secure. We also present a case study to demonstrate the use of C-PROSRCC for mobile-based selective sharing of a family car. |
URL | https://ieeexplore.ieee.org/document/8993103 |
DOI | 10.1109/UEMCON47517.2019.8993103 |
Citation Key | sethia_constant_2019 |
- Internet of Things
- valid users
- scalable revocation
- Scalability
- resource-constrained IoT devices
- resource constraints
- related schemes
- pubcrawl
- portable devices
- policy-based governance
- mobile-based selective sharing
- mobile computing
- malicious users
- IoT
- Internet of Things device
- authorisation
- Cryptography
- CP-ABE
- constant size CP-ABE
- constant number
- constant ciphertext length CP-ABE scheme
- constant ciphertext
- constant cipher-text
- collaboration
- ciphertext-policy attribute encryption scheme
- chosen ciphertext attack secure
- CCA-secure
- CCA secure proxy-based scalable revocation
- C-PROSRCC scheme