Efficient anonymous attribute-based encryption with access policy hidden for cloud computing

Chanying Huang, Kedong Yan, Songjie Wei, Gongxuan Zhang, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Abstract

Cloud computing is a revolutionary information technology paradigm, which provides users with unlimited, scalale, low-cost and convenient resource services, but when data is outsourced to a semi-trusted cloud server, challenging security issues such as user privacy, access control, etc. still urgently need to be addressed. Attribute-based encryption (ABE) scheme can provide sufficient data security and fine-grained access control for cloud data. However, the limitation of ABE is that user's privacy would be disclosed with the access policy (structure) stored in clear text. Some works sacrificed the computing efficiency, key length or ciphertext size for privacy concerns. To overcome these problems, this paper proposes an efficient anonymous attributebased encryption scheme with access policy hidden. Using the idea of Boolean equivalent transformation, the proposed scheme can achieve fast encryption and protect the privacy for both data owner and legitimate access user. In addition, the proposed scheme can satisfy constant secret key length and reasonable size of ciphertext requirements. We conduct theoretical security analysis, and carry out experiments to prove that the proposed scheme has good performance in terms of computational, communication and storage overheads.

Original languageEnglish
Title of host publicationProceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages266-270
Number of pages5
ISBN (Electronic)9781538619773
DOIs
Publication statusPublished - 2017
Event5th International Conference on Progress in Informatics and Computing, PIC 2017 - Nanjing, China
Duration: 2017 Dec 152017 Dec 17

Publication series

NameProceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017

Other

Other5th International Conference on Progress in Informatics and Computing, PIC 2017
Country/TerritoryChina
CityNanjing
Period17/12/1517/12/17

Bibliographical note

Funding Information:
This work is supported by China NSF (61472189), Jiangsu Planned Projects for Postdoctoral Research Funds (1701146B), CERNET Next Generation IT Inovation Project (NGII20160105), the Open Project Program of Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education(JYB201610), and State Key Laboratory of Air Traffic Management System and Technology (SKLATM201703).

Publisher Copyright:
© 2017 IEEE.

Keywords

  • Access policy hidden
  • Anonymity
  • CP-ABE
  • Efficiency
  • Privacy

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems
  • Signal Processing

Fingerprint

Dive into the research topics of 'Efficient anonymous attribute-based encryption with access policy hidden for cloud computing'. Together they form a unique fingerprint.

Cite this