Skip to main content
Log in

An efficient outsourcing attribute-based encryption scheme in 5G mobile network environments

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Attribute-based encryption (ABE) provides a fine-grained access control mode for multiuser network environments. The popularity of 5th generation (5G) mobile network applications has greatly increased the data transmission rate, but mobile terminal devices with limited resources in the network have difficulty with the high computational overhead of ABE in wireless communication. In response to this problem, this paper proposes a hybrid encryption online/offline ciphertext policy attribute-based encryption (CP-ABE) scheme for 5G. In the scheme, the data owner uses symmetric encryption technology to perform data encapsulation on plaintext and outsources the encapsulated plaintext to the cloud user assistant (CUA) for offline calculation. Key encapsulation is performed on a symmetric key to form the final ciphertext, and it is uploaded to the cloud server. After the data user obtains the ciphertext, it is handed over to the CUA for offline decryption calculation. If the access structure is satisfied, the encapsulated ciphertext can be obtained, and then the symmetric key is used to decrypt the ciphertext. In the scheme, the correctness of the symmetric key can be verified to prevent malicious tampering in the process of transmission. It is indicated that the scheme is secure after being tested with the decisional q-Parallel Bilinear Diffie-Hellman Exponent (BDHE). Numerical analysis shows that the scheme has decreased computational overhead and can achieve fine-grained access control of user decryption rights.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Ji X, Huang K, Jin L et al. (2018) Overview of 5G security technology. Sci China Inform Sci 61(8):107–131

    Article  Google Scholar 

  2. Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer R (ed) Advances in cryptology—EUROCRYPT 2005. Springer, Berlin, pp 457–473

  3. Kumar P, Alphonse P (2018) Attribute based encryption in cloud computing: A survey, gap analysis, and future directions. J Netw Comput Appl 108:37–52

    Article  Google Scholar 

  4. Even S, Goldreich O, Micali S (1989) On-line/off-line digital signatures, conference on the theory and application of cryptology. Springer, Berlin, pp 263–275

    Google Scholar 

  5. Green M, Hohenberger S, Waters B (2011) Outsourcing the decryption of abe ciphertexts [C] USENIX security symposium. Vol. 2011. No. 3. 2011. pp 33–34

  6. Hohenberger S, Waters B (2014) Online/offline attribute-based encryption, International workshop on public key cryptography. Springer, Berlin, pp 293–310

    MATH  Google Scholar 

  7. He Q, Zhang N, Wei Y, Zhang et al. (2018) Lightweight attribute based encryption scheme for mobile cloud assisted cyber-physical systems, 140 163–173

  8. Liu Z, Jiang ZL, Wang X, Yiu S (2018) Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating. J Netw Comput Appl 108:112–123

    Article  Google Scholar 

  9. Cui J, Zhou H, Xu Y, Zhong H (2019) OOABKS: Online/offline Attribute-based encryption for keyword search in mobile cloud. Inform Sci 489:63–77

    Article  Google Scholar 

  10. El-Hadidi MT, Hegazi NH, Aslan HK (1995) Implementation of a hybrid encryption scheme for Ethernet[C] Computers and Communications, 1995. Proceedings. IEEE Symposium on. IEEE, pp 150–156

  11. Irawan C, Rachmawanto EH, Sari CA et al. (2019) Hybrid encryption using confused and stream cipher to improved medical images security[C]//Journal of Physics: Conference Series. IOP Publishing, 1201(1): 012022

  12. Çavuşoğlu Ü, Kaçar S, Zengin A, Pehlivan IJND (2018) A novel hybrid encryption algorithm based on chaos and s-AES algorithm. Nonlinear Dynam 92(4):1745–1759

    Article  Google Scholar 

  13. Zhou Y, Yang B, Yu Y et al. (2019) Efficient chosen-ciphertext secure hybrid encryption scheme tolerating continuous leakage attacks. J Chinese Instit Eng 42(1):39–47

    Article  Google Scholar 

  14. Tarif EB, Wibowo S, Wasimi SA et al. (2018) A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system. Multimed Tools Appl 77(2):2485–2503

    Article  Google Scholar 

  15. Singh R, Panchbhaiya I, Pandey A et al. (2015) Hybrid Encryption Scheme (HES): An approach for transmitting secure data over internet. Procedia Comput Sci 48:51–57

    Article  Google Scholar 

  16. Win EK, Yoshihisa T, Ishi Y et al. (2017) A lightweight multireceiver encryption scheme with mutual authentication[C]//2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2: 491–497

  17. Usman M, Ahmed I, Aslam MI et al. (2017) SIT: A lightweight encryption algorithm for secure internet of things. Int J Adv Comput Sci Appl 8:402–411

    Google Scholar 

  18. Boneh D, Goh EJ, Nissim K (2005) Evaluating 2-DNF formulas on ciphertexts[C]//Theory of cryptography conference. Springer, Berlin, Heidelberg, pp 325–341

  19. Beimel A (1996) Secure schemes for secret sharing and key distribution. Technion-Israel Institute of technology, Faculty of computer science

  20. Li F, Han Y, Jin C (2017) Certificateless online/offline signcryption for the Internet of Things. Wireless Netw 23(1):145–158

    Article  Google Scholar 

  21. Boneh D, Boyen X, Goh EJ (2005) Hierarchical identity based encryption with constant size ciphertext[C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, pp 440–456

  22. Shafi M, Molisch AF, Smith PJ et al. (2017) 5G: A tutorial overview of standards, trials, challenges, deployment, and practice. IEEE J Select Areas Commun 35(6):1201–1221

    Article  Google Scholar 

  23. Li S, Da Xu L, Zhao S (2018) 5G Internet of Things: A survey. J Indust Inform Integ 10:1–9

    Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (NSFC), 61662071,61662069 and 61562077.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Suzhen Cao.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, Z., Cao, S., Yang, X. et al. An efficient outsourcing attribute-based encryption scheme in 5G mobile network environments. Peer-to-Peer Netw. Appl. 14, 3488–3501 (2021). https://doi.org/10.1007/s12083-021-01195-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-021-01195-2

Keywords

Navigation