CP-ABE with constant-size keys for lightweight devices

Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

117 Scopus Citations
View graph of relations

Author(s)

  • Fuchun Guo
  • Yi Mu
  • Willy Susilo
  • Duncan S. Wong
  • Vijay Varadharajan

Related Research Unit(s)

Detail(s)

Original languageEnglish
Article number6757025
Pages (from-to)763-771
Journal / PublicationIEEE Transactions on Information Forensics and Security
Volume9
Issue number5
Online published5 Mar 2014
Publication statusPublished - May 2014

Abstract

Lightweight devices, such as radio frequency identification tags, have a limited storage capacity, which has become a bottleneck for many applications, especially for security applications. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic tool, where the encryptor can decide the access structure that will be used to protect the sensitive data. However, current CP-ABE schemes suffer from the issue of having long decryption keys, in which the size is linear to and dependent on the number of attributes. This drawback prevents the use of lightweight devices in practice as a storage of the decryption keys of the CP-ABE for users. In this paper, we provide an affirmative answer to the above long standing issue, which will make the CP-ABE very practical. We propose a novel CP-ABE scheme with constant-size decryption keys independent of the number of attributes. We found that the size can be as small as 672 bits. In comparison with other schemes in the literature, the proposed scheme is the only CP-ABE with expressive access structures, which is suitable for CP-ABE key storage in lightweight devices. © 2014 IEEE.

Research Area(s)

  • Attribute-based encryption, ciphertext policy, short decryption key.

Citation Format(s)

CP-ABE with constant-size keys for lightweight devices. / Guo, Fuchun; Mu, Yi; Susilo, Willy; Wong, Duncan S.; Varadharajan, Vijay.

In: IEEE Transactions on Information Forensics and Security, Vol. 9, No. 5, 6757025, 05.2014, p. 763-771.

Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review