Skip to main content

An Improved Ciphertext-Policy Attribute-Based Encryption Scheme

  • Conference paper
  • First Online:
Smart Computing and Communication (SmartCom 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10135))

Included in the following conference series:

  • 2596 Accesses

Abstract

According to characteristics of mass encryption service in cloud storage, this paper proposed an improved SCP-OOABE scheme which uses the access control tree as a control structure and decomposes key generation and encryption into online and offline phase respectively that could be finished in a short time in online phase. In addition, it also avoids the problem that CP-OOABE scheme can’t generate keys when constructing access control structures. What’s more, it meets the demand of the complex access control structure in cloud storage and was proved that the scheme is against chosen-plaintext attack secure. In a word, our scheme was security, efficient and universal, which suits for the demands of cloud storage.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Qiu, M., et al.: Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Future Gener. Comput. Syst. (2016)

    Google Scholar 

  2. Gai, K., Qiu, M., Zhao, H., et al.: Privacy-aware adaptive data encryption strategy of big data in cloud computing. In: IEEE International Conference on Cyber Security and Cloud Computing, Beijing (China), pp. 273–278. IEEE (2016)

    Google Scholar 

  3. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). doi:10.1007/11426639_27

    Chapter  Google Scholar 

  4. Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, New York (USA), pp. 89–98. ACM (2006)

    Google Scholar 

  5. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Security and Privacy, Los Alamitos, pp. 321-334. IEEE (2007)

    Google Scholar 

  6. Rouselakis, Y., Waters, B.: Practical constructions and new proof methods for large universe attribute-based encryption. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, New York (USA), pp. 463–474. ACM (2013)

    Google Scholar 

  7. Hohenberger, S., Waters, B.: Online/offline attribute-based encryption. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 293–310. Springer, Heidelberg (2014). doi:10.1007/978-3-642-54631-0_17

    Chapter  Google Scholar 

  8. Chow, S.S.M., Liu, J.K., Zhou, J.: Identity-based online/offline key encapsulation and encryption. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, New York (USA), pp. 52–60. ACM (2011)

    Google Scholar 

  9. Guo, F., Mu, Y., Chen, Z.: Identity-based online/offline encryption. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 247–261. Springer, Heidelberg (2008). doi:10.1007/978-3-540-85230-8_22

    Chapter  Google Scholar 

  10. Li, Y., Dai, W., Qiu, M., Ming, Z.: Privacy protection for preventing data over-collection in smart city. IEEE Trans. Comput. (2015)

    Google Scholar 

  11. Beimel, A.: Secure schemes for secret sharing and key distribution, Technion-Israel Institute of technology, Faculty of computer science, Haifa, Isral (1996)

    Google Scholar 

  12. Wang, Z., Chen, F., Xia, A.: Attribute-based online/offline encryption in smart grid. In: Computer Communication and Networks (ICCCN), pp. 1–5. IEEE, Berlin (2015)

    Google Scholar 

  13. Fan, C.I., Huang, V.S.M., Ruan, H.M.: Arbitrary-state attribute-based encryption with dynamic membership. IEEE Trans. Comput. 63(8), 1951–1961 (2014)

    Article  MathSciNet  Google Scholar 

  14. Zhang, X., Chen, M., Liu, H., et al.: Practical identity-based threshold decryption scheme without random oracle (in Chinese). J. ShenZhen Univ. Sci. Eng. 37(3), 340–346 (2010)

    Google Scholar 

  15. Lewko, A.: Tools for simulating features of composite order bilinear groups in the prime order setting. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 318–335. Springer, Heidelberg (2012). doi:10.1007/978-3-642-29011-4_20

    Chapter  Google Scholar 

  16. Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13190-5_4

    Chapter  Google Scholar 

  17. Zhang, X., Chen, M., Yang, L., et al.: Cryptanalysis of an identity-based multi-recipient signcryption scheme (in Chinese). J. ShenZhen Univ. Sci. Eng. 37(4), 408–412 (2010)

    Google Scholar 

  18. Galindo, D.: Boneh-Franklin identity based encryption revisited. In: Caires, L., Italiano, Giuseppe, F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 791–802. Springer, Heidelberg (2005). doi:10.1007/11523468_64

    Chapter  Google Scholar 

  19. Ruj, S., Stojmenovic, M., Nayak, A.: Decentralized access control with anonymous authentication of data stored in clouds. IEEE Trans. Parallel Distrib. Syst. 25(2), 384–394 (2014)

    Article  Google Scholar 

  20. Qiu, M., Ming, Z., Li, J., Gai, K., Zong, Z.: Phase-change memory optimization for green cloud with genetic algorithm. IEEE Trans. Comput. 64(12), 3528–3540 (2015)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hua Zheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Zheng, H., Zhang, X., Yang, Q. (2017). An Improved Ciphertext-Policy Attribute-Based Encryption Scheme. In: Qiu, M. (eds) Smart Computing and Communication. SmartCom 2016. Lecture Notes in Computer Science(), vol 10135. Springer, Cham. https://doi.org/10.1007/978-3-319-52015-5_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-52015-5_41

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-52014-8

  • Online ISBN: 978-3-319-52015-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics