Mostra el registre d'ítem simple
Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation
dc.contributor.author | Zhang, Jindan |
dc.contributor.author | Wang, Baocang |
dc.contributor.author | Xhafa Xhafa, Fatos |
dc.contributor.author | An Wang, Xu |
dc.contributor.author | Li, Cong |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament de Ciències de la Computació |
dc.date.accessioned | 2018-01-08T14:57:54Z |
dc.date.available | 2018-12-29T01:31:14Z |
dc.date.issued | 2017-12-29 |
dc.identifier.citation | Zhang, J., Wang, B., Xhafa, F., An, X., Li, C. Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation. "Journal of ambient intelligence and humanized computing", 29 Desembre 2017. |
dc.identifier.issn | 1868-5137 |
dc.identifier.uri | http://hdl.handle.net/2117/112465 |
dc.description | This is a copy of the author 's final draft version of an article published in the "Journal of ambient intelligence and humanized computing". The final publication is available at Springer via http://dx.doi.org/10.1007/s12652-017-0658-2 |
dc.description.abstract | In this paper two new ways for efficient secure outsourcing the decryption of key-policy attribute-based encryption (KP-ABE) with energy efficiency are proposed. Based on an observation about the permutation property of the access structure for the attribute based encryption schemes, we propose a high efficient way for outsourcing the decryption of KP-ABE, which is suitable for being used in mobile devices. But it can only be used for the ABE schemes having tree-like access structure for the self-enclosed system. The second way is motivated from the fact that almost all the previous work on outsourcing the decryption of KP-ABE cares little about the ciphertext length. Almost all the previous schemes for secure outsourcing the decryption of ABE have linear length ciphertext with the attributes or the policy. But transferring so long ciphertexts via wireless network for mobile phone can easily run out of battery power, therefore it can not be adapted to practical application scenarios. Thus another new scheme for outsourcing the decryption of ABE but with constant-size ciphertexts is proposed. Furthermore, our second proposal gives a new efficient way for secure outsourcing the decryptor’s secret key to the cloud, which need only one modular exponentiation while all the previous schemes need many. We evaluate the efficiency of our proposals and the results show that our proposals are practical. |
dc.language.iso | eng |
dc.publisher | Springer |
dc.subject | Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica |
dc.subject.lcsh | Data encryption (Computer science) |
dc.subject.lcsh | Cloud computing |
dc.subject.lcsh | Mobile communication systems |
dc.title | Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation |
dc.type | Article |
dc.subject.lemac | Xifratge (Informàtica) |
dc.subject.lemac | Computació en núvol |
dc.subject.lemac | Comunicacions mòbils, Sistemes de |
dc.identifier.doi | 10.1007/s12652-017-0658-2 |
dc.description.peerreviewed | Peer Reviewed |
dc.relation.publisherversion | https://link.springer.com/article/10.1007%2Fs12652-017-0658-2 |
dc.rights.access | Open Access |
local.identifier.drac | 21688737 |
dc.description.version | Postprint (author's final draft) |
local.citation.author | Zhang, J.; Wang, B.; Xhafa, F.; An, X.; Li, C. |
local.citation.publicationName | Journal of ambient intelligence and humanized computing |
Fitxers d'aquest items
Aquest ítem apareix a les col·leccions següents
-
Articles de revista [1.046]