Skip to main content
Log in

Efficient attribute-based encryption with repeated attributes optimization

  • Regular contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

Internet of Things (IoT) is an integration of various technologies to provide technological enhancements. To enforce access control on low power operated battery constrained devices is a challenging issue in IoT scenarios. Attribute-based encryption (ABE) has emerged as an access control mechanism to allow users to encrypt and decrypt data based on an attributes policy. However, to accommodate the expressiveness of policy for practical application scenarios, attributes may be repeated in a policy. For certain policies, the attributes repetition cannot be avoided even after applying the boolean optimization techniques to attain an equivalent smaller length boolean formula. For such policies, the evaluated secret shares are also multiple for repeated attributes; hence, the ciphertext computed for those irreducible policies is long and computational effort is more. To address this issue, a new CP-ABE scheme is proposed which employs our Repeated Attributes Optimization algorithm by which the Linear Secret Sharing Scheme matrix sent along with ciphertext will contain the access structure of policy including attributes appearing multiple times, but the ciphertext will only be evaluated for unique non-repeated attributes. Security and performance analysis show that the proposed construction fulfils its goals of achieving desired security with low communication overhead and computational cost for resource-constrained devices.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Atzori, L., Iera, A., Morabito, G.: The Internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  Google Scholar 

  2. Li, S., Da Xu, L., Zhao, S.: 5G Internet of things: a survey. J. Ind. Inf. Integr. 10, 1–9 (2018). https://doi.org/10.1016/j.jii.2018.01.005

    Article  Google Scholar 

  3. Da Xu, L., He, W., Li, S.: Internet of things in industries: a survey. IEEE Trans. Ind. Inf. 10(4), 2233–2243 (2014). https://doi.org/10.1109/TII.2014.2300753

    Article  Google Scholar 

  4. Mell, P., Grance, T.: The NIST definition of cloud computing, 20–23 (2011)

  5. Zheng, X., Martin, P., Brohman, K., Da Xu, L.: CLOUDQUAL: a quality model for cloud services. IEEE Trans. Ind. Inf. 10(2), 1527–1536 (2014). https://doi.org/10.1109/TII.2014.2306329

    Article  Google Scholar 

  6. Zheng, X., Martin, P., Brohman, K., Da Xu, L.: Cloud service negotiation in internet of things environment: a mixed approach. IEEE Trans. Ind. Inf. 10(2), 1506–1515 (2014). https://doi.org/10.1109/TII.2014.2305641

    Article  Google Scholar 

  7. Bethencourt, J., Sahai, A., & Waters, B.: Ciphertext-policy attribute-based encryption. In: Security and Privacy, 2007. SP’07. IEEE Symposium on, pp. 321–334 (2007)

  8. Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: International Workshop on Public Key Cryptography (pp. 53–70). Springer, Berlin (2011)

  9. Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 568–588). Springer, Berlin (2011)

  10. Rouselakis, Y., Waters, B.: Efficient statically-secure large-universe multi-authority attribute-based encryption. In: International Conference on Financial Cryptography and Data Security (pp. 315–332). Springer, Berlin (2015)

  11. Rouselakis, Y., Waters, B.: New constructions and proof methods for large universe attribute-based encryption. IACR Cryptology EPrint Archive 583 (2012)

  12. Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 62–91). Springer, Berlin (2010)

  13. Liu, Z., Cao, Z., Wong, D.S.: Efficient generation of linear secret sharing scheme matrices from threshold access trees (vol. 2010). IACR Cryptology ePrint Archive (2010)

  14. Lewko, A., Waters, B.: New proof methods for attribute-based encryption: achieving full security through selective techniques. In: Advances in Cryptology-CRYPTO 2012 (pp. 180–198). Springer, Berlin (2012)

  15. Takashima, K.: New proof techniques for DLIN-based adaptively secure attribute-based encryption. In: Australasian Conference on Information Security and Privacy (pp. 85–105). Springer, Cham (2017)

  16. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (pp. 89–98). ACM (2006)

  17. Kapadia, A., Tsang, P.P., Smith, S.W.: Attribute-based publishing with hidden credentials and hidden policies. In: NDSS (vol. 7, pp. 179–192) (2007)

  18. Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: International Conference on Applied Cryptography and Network Security (pp. 111–129). Springer, Berlin (2008)

  19. Chase, M.: Multi-authority attribute based encryption. In: Theory of Cryptography Conference (pp. 515–534). Springer, Berlin (2007)

  20. Muller, S., Katzenbeisser, S., Eckert, C.: Distributed attribute-based encryption. In: International Conference on Information Security and Cryptology (pp. 20–36). Springer, Berlin (2008)

  21. Khan, F., Li, H., Zhang, L.: Owner specified excessive access control for attribute based encryption. IEEE Access 4, 8967–8976 (2016)

    Article  Google Scholar 

  22. Beimel, A.: Secure schemes for secret sharing and key distribution, Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel (1996). [Online]. Available: https://www.cs.bgu.ac.il/ beimel/Papers/thesis.pdf

  23. Muller, S., Katzenbeisser, S., Eckert, C.: On multi-authority ciphertext-policy attribute-based encryption. Bull. Korean Math. Soc. 46(4), 803–819 (2009)

    Article  MathSciNet  Google Scholar 

  24. Boneh, D., Boyen, X., Goh, E.J.: Hierarchical identity based encryption with constant size ciphertext. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 440–456). Springer, Berlin (2005)

  25. Yamada, S., Attrapadung, N., Hanaoka, G., Kunihiro, N. (2011). Generic constructions for chosen-ciphertext secure attribute based encryption. In: International Workshop on Public Key Cryptography (pp. 71–89). Springer, Berlin

  26. Nandi, M., Pandit, T.: Generic conversions from CPA to CCA secure functional encryption. IACR Cryptol ePrint Archive 2015, 457 (2015)

    Google Scholar 

  27. Han, Q., Zhang, Y., Li, H.: Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things. Future Gener. Comput. Syst. 83, 269–277 (2018)

    Article  Google Scholar 

  28. Cui, H., Deng, R. H., Qin, B., Weng, J.: Key regeneration-free ciphertext-policy attribute-based encryption and its application. Inf. Sci. pp. 217–229 (2020). https://doi.org/10.1016/j.ins.2019.12.025

  29. Akinyele, J.A., Garman, C., Miers, I., Pagano, M.W., Rushanan, M., Green, M., Rubin, A.D.: Charm: a framework for rapidly prototyping cryptosystems. J. Cryptogr. Eng. 3(2), 111–128 (2013)

    Article  Google Scholar 

  30. Charm, http://www.charm-crypto.io/. Accessed 20 April 2019

  31. Pairing Based Cryptography Library (PBC), https://crypto.stanford.edu/pbc/. Accessed 20 April 2019

Download references

Funding

This study was funded by National Natural Science Foundation of China under Grant U1401251, China 111 Project (No. B16037) and Shaanxi Key Basic Research Project 2016ZDJC-04.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fawad Khan.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khan, F., Li, H., Zhang, Y. et al. Efficient attribute-based encryption with repeated attributes optimization. Int. J. Inf. Secur. 20, 431–444 (2021). https://doi.org/10.1007/s10207-020-00505-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-020-00505-8

Keywords

Navigation