Skip to main content
Log in

Provably Secure Threshold-Based ABE Scheme Without Bilinear Map

  • Research Article - Computer Engineering and Computer Science
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

In several distributed environments, users can decrypt a secret message using a certain number of valid attributes or credentials. Attribute-based encryption (ABE) is the most promising technique to achieve such fine-grain access control. In recent years, many ABE schemes have been proposed, but most of them are constructed based on the concept of pairing and secret sharing scheme. This paper aims at presenting a pairing-free threshold-based ABE scheme (PT-ABE) over multiplicative group. The propose work is secured under the standard decisional Diffie–Hellman (DDH) assumption, and both error-tolerant and collusion-free. The scheme does not consider random oracle operation to prove its security. We compare the PT-ABE scheme with other relevant ABE schemes and find that our scheme is much more efficient and flexible than others. Besides, we propose a protocol based on PT-ABE scheme and show that PT-ABE is perfectly suitable in cloud environment to provide cloud security. To the best of our knowledge, the proposed scheme should be implemented in real- life distributed scenarios, as it is well secured, flexible and perform better than existing ones.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Advances in Cryptology, pp. 47–53. Springer, Berlin (1985)

  2. Boneh D., Franklin M.: Identity-based encryption from the weil pairing. SIAM J. Comput. 32(3), 586–615 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  3. Kumar, R.; Amin, R.; Karati, A.; Biswas, G.P.: Secure remote login scheme with password and smart card update facilities. In: Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications-FICTA 2015, pp. 495–505. Springer India (2016)

  4. He D., Zeadally S.: Authentication protocol for an ambient assisted living system. Commun. Mag. IEEE 53(1), 71–77 (2015)

    Article  Google Scholar 

  5. Khan M.K.: Fingerprint biometric-based self-authentication and deniable authentication schemes for the electronic world. IETE Tech. Rev. 26(3), 191–195 (2009)

    Article  Google Scholar 

  6. He D., Kumar N., Chen J., Lee C.C., Chilamkurti N., Yeo S.S.: Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed. Syst. 21(1), 49–60 (2015)

    Article  Google Scholar 

  7. Khan, M.K.; Zhang, J.: An efficient and practical fingerprint-based remote user authentication scheme with smart cards. In: Information Security Practice and Experience pp. 260–268. Springer, Berlin (2006)

  8. Khan, M.K.; Zhang, J.; Tian, L.: Protecting biometric data for personal identification. In: Advances in Biometric Person Authentication, pp. 629–638. Springer (2005)

  9. Islam S.K., Khan M.K., Al-Khouri A.M.: Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing. Secur. Commun. Netw. 8(13), 2214–2231 (2015)

    Article  Google Scholar 

  10. He D., Wang D.: Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst. J. 9(3), 813–823 (2015)

    Article  Google Scholar 

  11. He D., Kumar N., Chilamkurti N.: A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inform. Sci. 321, 263–277 (2015)

    Article  Google Scholar 

  12. Amin R., Biswas G.P.: A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Networks 36, 58–80 (2016)

    Article  Google Scholar 

  13. Amin, R.; Islam, S.K.H.; Biswas, G.P.; Muhammad, K. K.; Lu,L.; Neeraj, K.: Design of anonymity preserving three-factor authenticated key exchange protocol for wireless sensor network. Comput. Netw. (2016)

  14. Giri D., Sherratt R.S., Maitra T., Amin R.: Efficient biometric and password based mutual authentication for consumer usb mass storage devices. IEEE Trans. Consum. Electron. 61(4), 491–499 (2015)

    Article  Google Scholar 

  15. Sahai, A.; Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology–EUROCRYPT 2005, pp. 457–473. Springer, Berlin (2005)

  16. Nali D., Adams Carlisle M., Miri A.: Using threshold attribute-based encryption for practical biometric-based access control. IJ Netw. Secur. 1(3), 173–182 (2005)

    MATH  Google Scholar 

  17. Goyal, V.; Pandey, O.; Sahai, A.; Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security, pp. 89–98. ACM, (2006)

  18. Bethencourt, A.S.J.; Waters, B.: Ciphertext-policy attribute-based encryption. In: Security and Privacy, 2007. SP’07. IEEE Symposium on, pp. 321–334. IEEE, (2007)

  19. Lewko, A.; Okamoto, T.; Sahai, A.; Takashima, K.; Waters, B.: Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Advances in Cryptology–EUROCRYPT 2010, pp. 62–91. Springer, Berlin (2010)

  20. Ostrovsky, R.; Sahai, A.; Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM conference on Computer and communications security, pp. 195–203. ACM, (2007)

  21. Attrapadung, N.; Libert, B.; De Panafieu, E.: Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: Public Key Cryptography–PKC 2011, pp. 90–108. Springer, Berlin (2011)

  22. Chase, M.: Multi-authority attribute based encryption. In: Theory of Cryptography, pp. 515–534. Springer, Berlin (2007)

  23. Chase, M.; Chow, S.S.M.: Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM conference on Computer and communications security, pp. 121–130. ACM, (2009)

  24. Herranz, J.; Laguillaumie, F.; Rà àfols, C.: Constant size ciphertexts in threshold attribute-based encryption. In: Public Key Cryptography–PKC 2010, pp. 19–34. Springer, Berlin (2010)

  25. Lewko, A.; Waters, B.: Unbounded hibe and attribute-based encryption. In: Advances in Cryptology–EUROCRYPT 2011, pp. 547–567. Springer, Berlin (2011)

  26. Waters, Brent.: Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Public Key Cryptography–PKC 2011, pp. 53–70. Springer, (2011)

  27. Zhang, J.; Zhang, Z.: A ciphertext policy attribute-based encryption scheme without pairings. In: Information Security and Cryptology, pp. 324–340. Springer (2012)

  28. Akinyele, J.A.; Lehmann, C.U.; Green, M.D.; Pagano, M.W.; Peterson, Z.N.J.; Rubin, A.D.: Self-protecting electronic medical records using attribute-based encryption. (2010)

  29. Ibraimi, L.; Asim, M.; Petković, M.: Secure management of personal health records by applying attribute-based encryption. In: Wearable Micro and Nano Technologies for Personalized Health (pHealth), 2009 6th International Workshop on IEEE, pp. 71–74. (2009)

  30. Liang, X.-H.; Lu, R.-x.; Lin, X.-d.; Shen, X.S.: Patient self-controllable access policy on phi in ehealthcare systems. AHIC 2010, pp. 1–5, (2010)

  31. Narayan, S.; Gagné, M.; Safavi-Naini, R.: Privacy preserving ehr system using attribute-based infrastructure. In: Proceedings of the 2010 ACM workshop on Cloud computing security workshop, pp. 47–52. ACM, (2010)

  32. Wang, G.; Liu, Q.; Wu, J.: Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: Proceedings of the 17th ACM conference on Computer and communications security, pp. 735–737. ACM, (2010)

  33. Wang G., Liu Q., Wu J., Guo M.: Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur. 30(5), 320–331 (2011)

    Article  Google Scholar 

  34. Wan Z., Liu J.E., Deng R.H.: Hasbe: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inform. Forensics Secur. 7(2), 743–754 (2012)

    Article  Google Scholar 

  35. Hur J., Noh D. K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214–1221 (2011)

    Article  Google Scholar 

  36. Li M., Yu S., Zheng Y., Ren K., Lou We.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131–143 (2013)

    Article  Google Scholar 

  37. Yu, S.; Wang, C.; Ren, K.; Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, pp 1–9. IEEE, (2010)

  38. Yu, S.; Wang, C.; Ren, K.; Lou, W.: Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 261–270. ACM, (2010)

  39. Debiao H., Jianhua C., Jin H.: An id-based proxy signature schemes without bilinear pairings. Ann Telecommun Annales Des télé Communications 66(11-12), 657–662 (2011)

    Article  Google Scholar 

  40. Ge, A.; Zhang, R.; Chen, C.; Ma, C.; Zhang, Z.: Threshold ciphertext policy attribute-based encryption with constant size ciphertexts. In: Information Security and Privacy, pp. 336–349. Springer, Berlin (2012)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arijit Karati.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Karati, A., Amin, R. & Biswas, G.P. Provably Secure Threshold-Based ABE Scheme Without Bilinear Map. Arab J Sci Eng 41, 3201–3213 (2016). https://doi.org/10.1007/s13369-016-2156-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-016-2156-9

Keywords

Navigation