Efficient anonymous attribute-based encryption with access policy hidden for cloud computing

Chanying Huang, Kedong Yan, Songjie Wei, Gongxuan Zhang, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Cloud computing is a revolutionary information technology paradigm, which provides users with unlimited, scalale, low-cost and convenient resource services, but when data is outsourced to a semi-trusted cloud server, challenging security issues such as user privacy, access control, etc. still urgently need to be addressed. Attribute-based encryption (ABE) scheme can provide sufficient data security and fine-grained access control for cloud data. However, the limitation of ABE is that user's privacy would be disclosed with the access policy (structure) stored in clear text. Some works sacrificed the computing efficiency, key length or ciphertext size for privacy concerns. To overcome these problems, this paper proposes an efficient anonymous attributebased encryption scheme with access policy hidden. Using the idea of Boolean equivalent transformation, the proposed scheme can achieve fast encryption and protect the privacy for both data owner and legitimate access user. In addition, the proposed scheme can satisfy constant secret key length and reasonable size of ciphertext requirements. We conduct theoretical security analysis, and carry out experiments to prove that the proposed scheme has good performance in terms of computational, communication and storage overheads.

Original languageEnglish
Title of host publicationProceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages266-270
Number of pages5
ISBN (Electronic)9781538619773
DOIs
Publication statusPublished - 2018 May 15
Event5th International Conference on Progress in Informatics and Computing, PIC 2017 - Nanjing, China
Duration: 2017 Dec 152017 Dec 17

Other

Other5th International Conference on Progress in Informatics and Computing, PIC 2017
CountryChina
CityNanjing
Period17/12/1517/12/17

Keywords

  • Access policy hidden
  • Anonymity
  • CP-ABE
  • Efficiency
  • Privacy

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems
  • Signal Processing

Fingerprint Dive into the research topics of 'Efficient anonymous attribute-based encryption with access policy hidden for cloud computing'. Together they form a unique fingerprint.

  • Cite this

    Huang, C., Yan, K., Wei, S., Zhang, G., & Lee, D. H. (2018). Efficient anonymous attribute-based encryption with access policy hidden for cloud computing. In Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017 (pp. 266-270). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/PIC.2017.8359555