Abstract
Internet of Things (IoT) is an integration of various technologies to provide technological enhancements. To enforce access control on low power operated battery constrained devices is a challenging issue in IoT scenarios. Attribute-based encryption (ABE) has emerged as an access control mechanism to allow users to encrypt and decrypt data based on an attributes policy. However, to accommodate the expressiveness of policy for practical application scenarios, attributes may be repeated in a policy. For certain policies, the attributes repetition cannot be avoided even after applying the boolean optimization techniques to attain an equivalent smaller length boolean formula. For such policies, the evaluated secret shares are also multiple for repeated attributes; hence, the ciphertext computed for those irreducible policies is long and computational effort is more. To address this issue, a new CP-ABE scheme is proposed which employs our Repeated Attributes Optimization algorithm by which the Linear Secret Sharing Scheme matrix sent along with ciphertext will contain the access structure of policy including attributes appearing multiple times, but the ciphertext will only be evaluated for unique non-repeated attributes. Security and performance analysis show that the proposed construction fulfils its goals of achieving desired security with low communication overhead and computational cost for resource-constrained devices.
Similar content being viewed by others
References
Atzori, L., Iera, A., Morabito, G.: The Internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
Li, S., Da Xu, L., Zhao, S.: 5G Internet of things: a survey. J. Ind. Inf. Integr. 10, 1–9 (2018). https://doi.org/10.1016/j.jii.2018.01.005
Da Xu, L., He, W., Li, S.: Internet of things in industries: a survey. IEEE Trans. Ind. Inf. 10(4), 2233–2243 (2014). https://doi.org/10.1109/TII.2014.2300753
Mell, P., Grance, T.: The NIST definition of cloud computing, 20–23 (2011)
Zheng, X., Martin, P., Brohman, K., Da Xu, L.: CLOUDQUAL: a quality model for cloud services. IEEE Trans. Ind. Inf. 10(2), 1527–1536 (2014). https://doi.org/10.1109/TII.2014.2306329
Zheng, X., Martin, P., Brohman, K., Da Xu, L.: Cloud service negotiation in internet of things environment: a mixed approach. IEEE Trans. Ind. Inf. 10(2), 1506–1515 (2014). https://doi.org/10.1109/TII.2014.2305641
Bethencourt, J., Sahai, A., & Waters, B.: Ciphertext-policy attribute-based encryption. In: Security and Privacy, 2007. SP’07. IEEE Symposium on, pp. 321–334 (2007)
Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: International Workshop on Public Key Cryptography (pp. 53–70). Springer, Berlin (2011)
Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 568–588). Springer, Berlin (2011)
Rouselakis, Y., Waters, B.: Efficient statically-secure large-universe multi-authority attribute-based encryption. In: International Conference on Financial Cryptography and Data Security (pp. 315–332). Springer, Berlin (2015)
Rouselakis, Y., Waters, B.: New constructions and proof methods for large universe attribute-based encryption. IACR Cryptology EPrint Archive 583 (2012)
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 62–91). Springer, Berlin (2010)
Liu, Z., Cao, Z., Wong, D.S.: Efficient generation of linear secret sharing scheme matrices from threshold access trees (vol. 2010). IACR Cryptology ePrint Archive (2010)
Lewko, A., Waters, B.: New proof methods for attribute-based encryption: achieving full security through selective techniques. In: Advances in Cryptology-CRYPTO 2012 (pp. 180–198). Springer, Berlin (2012)
Takashima, K.: New proof techniques for DLIN-based adaptively secure attribute-based encryption. In: Australasian Conference on Information Security and Privacy (pp. 85–105). Springer, Cham (2017)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (pp. 89–98). ACM (2006)
Kapadia, A., Tsang, P.P., Smith, S.W.: Attribute-based publishing with hidden credentials and hidden policies. In: NDSS (vol. 7, pp. 179–192) (2007)
Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: International Conference on Applied Cryptography and Network Security (pp. 111–129). Springer, Berlin (2008)
Chase, M.: Multi-authority attribute based encryption. In: Theory of Cryptography Conference (pp. 515–534). Springer, Berlin (2007)
Muller, S., Katzenbeisser, S., Eckert, C.: Distributed attribute-based encryption. In: International Conference on Information Security and Cryptology (pp. 20–36). Springer, Berlin (2008)
Khan, F., Li, H., Zhang, L.: Owner specified excessive access control for attribute based encryption. IEEE Access 4, 8967–8976 (2016)
Beimel, A.: Secure schemes for secret sharing and key distribution, Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel (1996). [Online]. Available: https://www.cs.bgu.ac.il/ beimel/Papers/thesis.pdf
Muller, S., Katzenbeisser, S., Eckert, C.: On multi-authority ciphertext-policy attribute-based encryption. Bull. Korean Math. Soc. 46(4), 803–819 (2009)
Boneh, D., Boyen, X., Goh, E.J.: Hierarchical identity based encryption with constant size ciphertext. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 440–456). Springer, Berlin (2005)
Yamada, S., Attrapadung, N., Hanaoka, G., Kunihiro, N. (2011). Generic constructions for chosen-ciphertext secure attribute based encryption. In: International Workshop on Public Key Cryptography (pp. 71–89). Springer, Berlin
Nandi, M., Pandit, T.: Generic conversions from CPA to CCA secure functional encryption. IACR Cryptol ePrint Archive 2015, 457 (2015)
Han, Q., Zhang, Y., Li, H.: Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things. Future Gener. Comput. Syst. 83, 269–277 (2018)
Cui, H., Deng, R. H., Qin, B., Weng, J.: Key regeneration-free ciphertext-policy attribute-based encryption and its application. Inf. Sci. pp. 217–229 (2020). https://doi.org/10.1016/j.ins.2019.12.025
Akinyele, J.A., Garman, C., Miers, I., Pagano, M.W., Rushanan, M., Green, M., Rubin, A.D.: Charm: a framework for rapidly prototyping cryptosystems. J. Cryptogr. Eng. 3(2), 111–128 (2013)
Charm, http://www.charm-crypto.io/. Accessed 20 April 2019
Pairing Based Cryptography Library (PBC), https://crypto.stanford.edu/pbc/. Accessed 20 April 2019
Funding
This study was funded by National Natural Science Foundation of China under Grant U1401251, China 111 Project (No. B16037) and Shaanxi Key Basic Research Project 2016ZDJC-04.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Khan, F., Li, H., Zhang, Y. et al. Efficient attribute-based encryption with repeated attributes optimization. Int. J. Inf. Secur. 20, 431–444 (2021). https://doi.org/10.1007/s10207-020-00505-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-020-00505-8