Efficient anonymous attribute-based encryption with access policy hidden for cloud computing

Chanying Huang, Kedong Yan, Songjie Wei, Gongxuan Zhang, Dong Hoon Lee

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)

    Abstract

    Cloud computing is a revolutionary information technology paradigm, which provides users with unlimited, scalale, low-cost and convenient resource services, but when data is outsourced to a semi-trusted cloud server, challenging security issues such as user privacy, access control, etc. still urgently need to be addressed. Attribute-based encryption (ABE) scheme can provide sufficient data security and fine-grained access control for cloud data. However, the limitation of ABE is that user's privacy would be disclosed with the access policy (structure) stored in clear text. Some works sacrificed the computing efficiency, key length or ciphertext size for privacy concerns. To overcome these problems, this paper proposes an efficient anonymous attributebased encryption scheme with access policy hidden. Using the idea of Boolean equivalent transformation, the proposed scheme can achieve fast encryption and protect the privacy for both data owner and legitimate access user. In addition, the proposed scheme can satisfy constant secret key length and reasonable size of ciphertext requirements. We conduct theoretical security analysis, and carry out experiments to prove that the proposed scheme has good performance in terms of computational, communication and storage overheads.

    Original languageEnglish
    Title of host publicationProceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages266-270
    Number of pages5
    ISBN (Electronic)9781538619773
    DOIs
    Publication statusPublished - 2017
    Event5th International Conference on Progress in Informatics and Computing, PIC 2017 - Nanjing, China
    Duration: 2017 Dec 152017 Dec 17

    Publication series

    NameProceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017

    Other

    Other5th International Conference on Progress in Informatics and Computing, PIC 2017
    Country/TerritoryChina
    CityNanjing
    Period17/12/1517/12/17

    Bibliographical note

    Funding Information:
    This work is supported by China NSF (61472189), Jiangsu Planned Projects for Postdoctoral Research Funds (1701146B), CERNET Next Generation IT Inovation Project (NGII20160105), the Open Project Program of Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education(JYB201610), and State Key Laboratory of Air Traffic Management System and Technology (SKLATM201703).

    Publisher Copyright:
    © 2017 IEEE.

    Keywords

    • Access policy hidden
    • Anonymity
    • CP-ABE
    • Efficiency
    • Privacy

    ASJC Scopus subject areas

    • Artificial Intelligence
    • Computer Networks and Communications
    • Computer Science Applications
    • Information Systems
    • Signal Processing

    Fingerprint

    Dive into the research topics of 'Efficient anonymous attribute-based encryption with access policy hidden for cloud computing'. Together they form a unique fingerprint.

    Cite this