Efficient and Expressive Anonymous Attribute-Based Encryption for Mobile Cloud Computing

  • Yinghui ZhangEmail author
  • Dong Zheng
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 2)


As a kind of attribute-based encryption, ciphertext-policy attribute-based encryption (CP-ABE) is a potential technique for realizing fine-grained access control on shared data. However, traditional CP-ABE is not suitable for mobile cloud computing, where mobile users are resource-limited and privacy is fragile. In this paper, we propose an anonymous CP-ABE scheme supporting offline key generation and offline encryption. In the proposed scheme, sensitive attribute values specified in an access structure are not explicitly sent along with a ciphertext. The online/offline encryption mechanism alleviates the computational burden of mobile users by performing most of encryption tasks without draining the battery. In addition, the online/offline key generation mechanism allows the attribute authority to finish most of operations in the key generation process in advance, which enables efficient mobile user registration. Finally, the proposed scheme is proven fully secure in the standard model and the performance analysis shows its effectiveness in mobile cloud computing.


Access Structure Mobile Cloud Mobile Cloud Computing Online Phase Attribute Authority 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Beimel, A.: Secure schemes for secret sharing and key distribution. Ph.D. thesis, Technion-Israel Institute of Technology (1996)Google Scholar
  2. 2.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. SP’07,pp. 321–334. IEEE, Oakland (2007)Google Scholar
  3. 3.
    Boneh, D., Goh, E.J., Nissim, K.: Evaluating 2-dnf formulas on ciphertexts. TCC’05, LNCS, vol. 3378, pp. 325–341. Springer, Berlin (2005)Google Scholar
  4. 4.
    Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. TCC’07, LNCS, vol. 4392, pp. 535–554. Springer, Berlin (2007)Google Scholar
  5. 5.
    Chen, X., Zhang, F., Susilo, W., Mu, Y.: Efficient generic on-line/off-line signatures without key exposure. ACNS’07, LNCS, vol. 4521, pp. 18–30. Springer, Berlin (2007)Google Scholar
  6. 6.
    Chen, X., Zhang, F., Tian, H., Wei, B., Susilo, W., Mu, Y., Lee, H., Kim, K.: Efficient generic on-line/off-line (threshold) signatures without key exposure. Information Sciences 178(21), 4192–4203 (2008)Google Scholar
  7. 7.
    Cheung, L., Newport, C.: Provably secure ciphertext policy abe. CCS’07, pp. 456–465. ACM, New York (2007)Google Scholar
  8. 8.
    Datta, P., Dutta, R., Mukhopadhyay, S.: Fully secure online/offline predicate and attribute based encryption. ISPEC’15, LNCS, vol. 9065, pp. 331–345. Springer, Berlin (2015)Google Scholar
  9. 9.
    Even, S., Goldreich, O., Micali, S.: On-line/off-line digital signatures. Journal of Cryptology 9(1), 35–67 (1996)Google Scholar
  10. 10.
    Goyal, V., Pandey, O., Sahai, A.,Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. CCS’06, pp. 89–98. ACM, New York (2006)Google Scholar
  11. 11.
    Guo, F., Mu, Y., Chen, Z.: Identity-based online/offline encryption. FC’08, Lecture Notes in Computer Science, vol. 12, pp. 247–261. Springer, Berlin (2008)Google Scholar
  12. 12.
    Hohenberger, S., Waters, B.: Online/offline attribute-based encryption. PKC’14, LNCS, vol. 8383, pp. 293–310. Springer, Berlin (2014)Google Scholar
  13. 13.
    Jung, T., Li, X.Y., Wan, Z., Wan, M.: Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. IEEE Transactions on Information Forensics and Security 10(1), 190–199 (2015)Google Scholar
  14. 14.
    Kapadia, A., Tsang, P.P., Smith, S.W.: Attribute-based publishing with hidden credentials and hidden policies. NDSS’07, pp. 179–192. The Internet Society (2007)Google Scholar
  15. 15.
    Katz, J., Sahai, A.,Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. EUROCRYPT’08, Lecture Notes in Computer Science, vol. 4965, pp. 146–162. Springer, Berlin (2008)Google Scholar
  16. 16.
    Lai, J., Deng, R.H., Li, Y.: Expressive cp-abe with partially hidden access structures. ASIACCS’ 12, pp. 18–19. ACM, New York (2012)Google Scholar
  17. 17.
    Li, J., Ren, K., Zhu, B., Wan, Z.: Privacy-aware attribute-based encryption with user accountability. ISC’09, LNCS, vol. 5735, pp. 347–362. Springer, Berlin (2009)Google Scholar
  18. 18.
    Nishide, T., Yoneyama, K., Ohta, K.: Abe with partially hidden encryptor-specified access structure. ACNS’08, Lecture Notes in Computer Science, vol. 5037, pp. 111–129. Springer, Berlin (2008)Google Scholar
  19. 19.
    Phuong, T.V.X., Yang, G., Susilo, W.: Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Transactions on Information Forensics and Security 11(1), 35–45 (2016)Google Scholar
  20. 20.
    Rao, Y.S., Dutta, R.: Fully secure bandwidth-efficient anonymous ciphertext-policy attributebased encryption. Security and Communication Networks 8(18), 4157–4176 (2015)Google Scholar
  21. 21.
    Sahai, A., Waters, B.: Fuzzy identity-based encryption. EUROCRYPT’05, LNCS, vol. 3494, pp. 557–557. Springer, Berlin (2005)Google Scholar
  22. 22.
    Zhang, Y., Chen, X., Li, J., Li, H.: Generic construction for secure and efficient handoff authentication schemes in eap-based wireless networks. Computer Networks 75, 192–211 (2014)Google Scholar
  23. 23.
    Zhang, Y., Chen, X., Li, J., Wong, D.S., Li, H.: Anonymous attribute-based encryption supporting efficient decryption test. ASIACCS’13, pp. 511–516. ACM, New York (2013)Google Scholar
  24. 24.
    Zhang, Y., Chen, X., Li, J., Wong, D.S., Li, H., You, I.: Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Information Sciences (2016). DOI 10.1016/j.ins.2016.04.015Google Scholar
  25. 25.
    Zhang, Y., Li, J., Chen, X., Li, H.: Anonymous attribute-based proxy re-encryption for access control in cloud computing. Security and Communication Networks 9(14), 2397–2411 (2016).Google Scholar
  26. 26.
    Zhang, Y., Zheng, D., Chen, X., Li, J., Li, H.: Efficient attribute-based data sharing in mobile clouds. Pervasive and Mobile Computing 28, 135–149 (2016)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.National Engineering Laboratory for Wireless SecurityXi’an University of Posts and TelecommunicationsXi’anP.R. China
  2. 2.State Key Laboratory of CryptologyBeijingP.R. China
  3. 3.Westone Cryptologic Research CenterBeijingP.R. China

Personalised recommendations