skip to main content
10.1145/3584376.3584532acmotherconferencesArticle/Chapter ViewAbstractPublication PagesricaiConference Proceedingsconference-collections
research-article

Parallel Optimized Attribute-Based Encryption Scheme Based on SM9

Published: 19 April 2023 Publication History

Abstract

With the development of cloud computing, secure file storage based on it is even more widely popular. Attribute-based encryption (ABE) is one of the key cryptographic techniques to solve the security of cloud storage. China has independently developed its own cryptography industry standard - SM9 identification encryption, which will be wildly used in many areas. However, the current SM9-based ABE scheme cannot effectively utilize the parallelized resources of cloud computing. With the parallel computing technology, a parallel optimized ABE scheme based on SM9 is proposed. The scheme's accuracy and security are carefully examined, and its effectiveness is examined through tests.

References

[1]
Sahai A, Waters B. Fuzzy Identity-Based Encryption [J]. Springer, Berlin, Heidelberg, 2005.
[2]
Goyal V, Pandey O, Sahai A, Attribute-based encryption for fine-grained access control of encrypted data [J]. ACM, 2006.
[3]
Yu S, Ren K, Lou W, Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems [J]. International Conference on Security and Privacy in Communication Systems, 2009.
[4]
Waters B. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization [C]. International Workshop on Public Key Cryptography. Springer, Berlin, Heidelberg, 2011.
[5]
Li H, Yu K, Liu B, An efficient ciphertext-policy weighted attribute-based encryption for the internet of health things [J]. IEEE Journal of Biomedical and Health Informatics, 2021, 26 (5): 1949-1960.
[6]
Shamir A. Identity-Based Cryptosystems and Signature Schemes [J]. Springer, Berlin, Heidelberg, 1984.
[7]
Dan B, Franklin M. Identity-Based Encryption from the Weil Pairing [C]. Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 2001.
[8]
SUN S, MA H, ZHANG R, Server-aided immediate and robust user revocation mechanism for sm9 [J]. Cybersecurity, 2020, 3 (1): 1-13.
[9]
KE W, YUAN Z, SONG L, A new identity based encryption scheme with accountable authority based on sm9 [C]. International Conference on Electronics, Communications and Networks: volume 345, 2022: 440-449.
[10]
Lai JC, Huang XY, He DB. An efficient identity-based broadcast encryption scheme based on SM9. Chinese Journal of Computers, 2021, 44 (5): 897–907.
[11]
Delerablée C. Identity-based broadcast encryption with constant size ciphertexts and private keys [C]. In: Proc. Of the 13th Int'l Conf. on the and Application of Cryptology and Information Security. Kuching: Springer, 2007. 200 –215.
[12]
Ji H, Zhang H, Shao L, An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud [J]. Connection Science, 2021, 33 (4): 1094-1115.
[13]
Shamir A. How to share a secret [J]. Communications of the ACM, 1979, 22 (11): 612-613.
[14]
Beimel A. Secure schemes for secret sharing and key distribution [J]. 1996.
[15]
Han YL, Gui XL, Wu XG. Parallel multi-recipient signcryption for imbalanced wireless networks [J], International Journal of Innovative Computing, Information and Control. 2010, Vol. 6 No. 8: 3621-3630.
[16]
Wu, Xuguang, Yiliang Han, Minqing Zhang, and Shuaishuai Zhu. Parallel long messages encryption scheme based on certificateless cryptosystem for big data [C]. In International Conference on Information Security and Cryptology, pp. 211-222. Springer, Cham, 2017.
[17]
Min, Zhaoe, Geng Yang, Arun Kumar Sangaiah, Shuangjie Bai, and Guoxiu Liu. A privacy protection-oriented parallel fully homomorphic encryption algorithm in cyber physical systems [J]. EURASIP Journal on Wireless Communications and Networking 2019, no. 1 (2019): 15.
[18]
Chen Biwen, Libing Wu, Li Li, Kim-Kwang Raymond Choo, and Debiao He. A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing [J]. IEEE Access 8. 2020: 28009-28020.
[19]
Ke G, Wang S, Wu H. Parallel incremental attribute-based encryption for mobile cloud data storage and sharing [J]. Journal of Ambient Intelligence and Humanized Computing, 2021: 1-11.
[20]
Bak S, Bertoni C, Boehm S, OpenMP application experiences: Porting to accelerated nodes [J]. Parallel Computing, 2022, 109: 102856.
[21]
Chandra R, Dagum L, Kohr D, Parallel programming in OpenMP [M]. Morgan kaufmann, 2001.
[22]
Gropp W, Gropp W D, Lusk E, Using MPI: portable parallel programming with the message-passing interface [M]. MIT press, 1999.
[23]
Lynn B. On the implementation of pairing-based cryptosystems [D]. Stanford University, 2007.
[24]
Mhash: An open source hash library. Accessed Dec 12, 2022 at http://mhash.sourceforge.net/.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
RICAI '22: Proceedings of the 2022 4th International Conference on Robotics, Intelligent Control and Artificial Intelligence
December 2022
1396 pages
ISBN:9781450398343
DOI:10.1145/3584376
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 April 2023

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

RICAI 2022

Acceptance Rates

Overall Acceptance Rate 140 of 294 submissions, 48%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 56
    Total Downloads
  • Downloads (Last 12 months)22
  • Downloads (Last 6 weeks)8
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media