Abstract
Attribute-based encryption (ABE) provides a fine-grained access control mode for multiuser network environments. The popularity of 5th generation (5G) mobile network applications has greatly increased the data transmission rate, but mobile terminal devices with limited resources in the network have difficulty with the high computational overhead of ABE in wireless communication. In response to this problem, this paper proposes a hybrid encryption online/offline ciphertext policy attribute-based encryption (CP-ABE) scheme for 5G. In the scheme, the data owner uses symmetric encryption technology to perform data encapsulation on plaintext and outsources the encapsulated plaintext to the cloud user assistant (CUA) for offline calculation. Key encapsulation is performed on a symmetric key to form the final ciphertext, and it is uploaded to the cloud server. After the data user obtains the ciphertext, it is handed over to the CUA for offline decryption calculation. If the access structure is satisfied, the encapsulated ciphertext can be obtained, and then the symmetric key is used to decrypt the ciphertext. In the scheme, the correctness of the symmetric key can be verified to prevent malicious tampering in the process of transmission. It is indicated that the scheme is secure after being tested with the decisional q-Parallel Bilinear Diffie-Hellman Exponent (BDHE). Numerical analysis shows that the scheme has decreased computational overhead and can achieve fine-grained access control of user decryption rights.
Similar content being viewed by others
References
Ji X, Huang K, Jin L et al. (2018) Overview of 5G security technology. Sci China Inform Sci 61(8):107–131
Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer R (ed) Advances in cryptology—EUROCRYPT 2005. Springer, Berlin, pp 457–473
Kumar P, Alphonse P (2018) Attribute based encryption in cloud computing: A survey, gap analysis, and future directions. J Netw Comput Appl 108:37–52
Even S, Goldreich O, Micali S (1989) On-line/off-line digital signatures, conference on the theory and application of cryptology. Springer, Berlin, pp 263–275
Green M, Hohenberger S, Waters B (2011) Outsourcing the decryption of abe ciphertexts [C] USENIX security symposium. Vol. 2011. No. 3. 2011. pp 33–34
Hohenberger S, Waters B (2014) Online/offline attribute-based encryption, International workshop on public key cryptography. Springer, Berlin, pp 293–310
He Q, Zhang N, Wei Y, Zhang et al. (2018) Lightweight attribute based encryption scheme for mobile cloud assisted cyber-physical systems, 140 163–173
Liu Z, Jiang ZL, Wang X, Yiu S (2018) Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating. J Netw Comput Appl 108:112–123
Cui J, Zhou H, Xu Y, Zhong H (2019) OOABKS: Online/offline Attribute-based encryption for keyword search in mobile cloud. Inform Sci 489:63–77
El-Hadidi MT, Hegazi NH, Aslan HK (1995) Implementation of a hybrid encryption scheme for Ethernet[C] Computers and Communications, 1995. Proceedings. IEEE Symposium on. IEEE, pp 150–156
Irawan C, Rachmawanto EH, Sari CA et al. (2019) Hybrid encryption using confused and stream cipher to improved medical images security[C]//Journal of Physics: Conference Series. IOP Publishing, 1201(1): 012022
Çavuşoğlu Ü, Kaçar S, Zengin A, Pehlivan IJND (2018) A novel hybrid encryption algorithm based on chaos and s-AES algorithm. Nonlinear Dynam 92(4):1745–1759
Zhou Y, Yang B, Yu Y et al. (2019) Efficient chosen-ciphertext secure hybrid encryption scheme tolerating continuous leakage attacks. J Chinese Instit Eng 42(1):39–47
Tarif EB, Wibowo S, Wasimi SA et al. (2018) A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system. Multimed Tools Appl 77(2):2485–2503
Singh R, Panchbhaiya I, Pandey A et al. (2015) Hybrid Encryption Scheme (HES): An approach for transmitting secure data over internet. Procedia Comput Sci 48:51–57
Win EK, Yoshihisa T, Ishi Y et al. (2017) A lightweight multireceiver encryption scheme with mutual authentication[C]//2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2: 491–497
Usman M, Ahmed I, Aslam MI et al. (2017) SIT: A lightweight encryption algorithm for secure internet of things. Int J Adv Comput Sci Appl 8:402–411
Boneh D, Goh EJ, Nissim K (2005) Evaluating 2-DNF formulas on ciphertexts[C]//Theory of cryptography conference. Springer, Berlin, Heidelberg, pp 325–341
Beimel A (1996) Secure schemes for secret sharing and key distribution. Technion-Israel Institute of technology, Faculty of computer science
Li F, Han Y, Jin C (2017) Certificateless online/offline signcryption for the Internet of Things. Wireless Netw 23(1):145–158
Boneh D, Boyen X, Goh EJ (2005) Hierarchical identity based encryption with constant size ciphertext[C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, pp 440–456
Shafi M, Molisch AF, Smith PJ et al. (2017) 5G: A tutorial overview of standards, trials, challenges, deployment, and practice. IEEE J Select Areas Commun 35(6):1201–1221
Li S, Da Xu L, Zhao S (2018) 5G Internet of Things: A survey. J Indust Inform Integ 10:1–9
Acknowledgements
This work is supported by the National Natural Science Foundation of China (NSFC), 61662071,61662069 and 61562077.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zhang, Z., Cao, S., Yang, X. et al. An efficient outsourcing attribute-based encryption scheme in 5G mobile network environments. Peer-to-Peer Netw. Appl. 14, 3488–3501 (2021). https://doi.org/10.1007/s12083-021-01195-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-021-01195-2