Abstract
In several distributed environments, users can decrypt a secret message using a certain number of valid attributes or credentials. Attribute-based encryption (ABE) is the most promising technique to achieve such fine-grain access control. In recent years, many ABE schemes have been proposed, but most of them are constructed based on the concept of pairing and secret sharing scheme. This paper aims at presenting a pairing-free threshold-based ABE scheme (PT-ABE) over multiplicative group. The propose work is secured under the standard decisional Diffie–Hellman (DDH) assumption, and both error-tolerant and collusion-free. The scheme does not consider random oracle operation to prove its security. We compare the PT-ABE scheme with other relevant ABE schemes and find that our scheme is much more efficient and flexible than others. Besides, we propose a protocol based on PT-ABE scheme and show that PT-ABE is perfectly suitable in cloud environment to provide cloud security. To the best of our knowledge, the proposed scheme should be implemented in real- life distributed scenarios, as it is well secured, flexible and perform better than existing ones.
Similar content being viewed by others
References
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Advances in Cryptology, pp. 47–53. Springer, Berlin (1985)
Boneh D., Franklin M.: Identity-based encryption from the weil pairing. SIAM J. Comput. 32(3), 586–615 (2003)
Kumar, R.; Amin, R.; Karati, A.; Biswas, G.P.: Secure remote login scheme with password and smart card update facilities. In: Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications-FICTA 2015, pp. 495–505. Springer India (2016)
He D., Zeadally S.: Authentication protocol for an ambient assisted living system. Commun. Mag. IEEE 53(1), 71–77 (2015)
Khan M.K.: Fingerprint biometric-based self-authentication and deniable authentication schemes for the electronic world. IETE Tech. Rev. 26(3), 191–195 (2009)
He D., Kumar N., Chen J., Lee C.C., Chilamkurti N., Yeo S.S.: Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed. Syst. 21(1), 49–60 (2015)
Khan, M.K.; Zhang, J.: An efficient and practical fingerprint-based remote user authentication scheme with smart cards. In: Information Security Practice and Experience pp. 260–268. Springer, Berlin (2006)
Khan, M.K.; Zhang, J.; Tian, L.: Protecting biometric data for personal identification. In: Advances in Biometric Person Authentication, pp. 629–638. Springer (2005)
Islam S.K., Khan M.K., Al-Khouri A.M.: Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing. Secur. Commun. Netw. 8(13), 2214–2231 (2015)
He D., Wang D.: Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst. J. 9(3), 813–823 (2015)
He D., Kumar N., Chilamkurti N.: A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inform. Sci. 321, 263–277 (2015)
Amin R., Biswas G.P.: A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Networks 36, 58–80 (2016)
Amin, R.; Islam, S.K.H.; Biswas, G.P.; Muhammad, K. K.; Lu,L.; Neeraj, K.: Design of anonymity preserving three-factor authenticated key exchange protocol for wireless sensor network. Comput. Netw. (2016)
Giri D., Sherratt R.S., Maitra T., Amin R.: Efficient biometric and password based mutual authentication for consumer usb mass storage devices. IEEE Trans. Consum. Electron. 61(4), 491–499 (2015)
Sahai, A.; Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology–EUROCRYPT 2005, pp. 457–473. Springer, Berlin (2005)
Nali D., Adams Carlisle M., Miri A.: Using threshold attribute-based encryption for practical biometric-based access control. IJ Netw. Secur. 1(3), 173–182 (2005)
Goyal, V.; Pandey, O.; Sahai, A.; Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security, pp. 89–98. ACM, (2006)
Bethencourt, A.S.J.; Waters, B.: Ciphertext-policy attribute-based encryption. In: Security and Privacy, 2007. SP’07. IEEE Symposium on, pp. 321–334. IEEE, (2007)
Lewko, A.; Okamoto, T.; Sahai, A.; Takashima, K.; Waters, B.: Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Advances in Cryptology–EUROCRYPT 2010, pp. 62–91. Springer, Berlin (2010)
Ostrovsky, R.; Sahai, A.; Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM conference on Computer and communications security, pp. 195–203. ACM, (2007)
Attrapadung, N.; Libert, B.; De Panafieu, E.: Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: Public Key Cryptography–PKC 2011, pp. 90–108. Springer, Berlin (2011)
Chase, M.: Multi-authority attribute based encryption. In: Theory of Cryptography, pp. 515–534. Springer, Berlin (2007)
Chase, M.; Chow, S.S.M.: Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM conference on Computer and communications security, pp. 121–130. ACM, (2009)
Herranz, J.; Laguillaumie, F.; Rà àfols, C.: Constant size ciphertexts in threshold attribute-based encryption. In: Public Key Cryptography–PKC 2010, pp. 19–34. Springer, Berlin (2010)
Lewko, A.; Waters, B.: Unbounded hibe and attribute-based encryption. In: Advances in Cryptology–EUROCRYPT 2011, pp. 547–567. Springer, Berlin (2011)
Waters, Brent.: Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Public Key Cryptography–PKC 2011, pp. 53–70. Springer, (2011)
Zhang, J.; Zhang, Z.: A ciphertext policy attribute-based encryption scheme without pairings. In: Information Security and Cryptology, pp. 324–340. Springer (2012)
Akinyele, J.A.; Lehmann, C.U.; Green, M.D.; Pagano, M.W.; Peterson, Z.N.J.; Rubin, A.D.: Self-protecting electronic medical records using attribute-based encryption. (2010)
Ibraimi, L.; Asim, M.; Petković, M.: Secure management of personal health records by applying attribute-based encryption. In: Wearable Micro and Nano Technologies for Personalized Health (pHealth), 2009 6th International Workshop on IEEE, pp. 71–74. (2009)
Liang, X.-H.; Lu, R.-x.; Lin, X.-d.; Shen, X.S.: Patient self-controllable access policy on phi in ehealthcare systems. AHIC 2010, pp. 1–5, (2010)
Narayan, S.; Gagné, M.; Safavi-Naini, R.: Privacy preserving ehr system using attribute-based infrastructure. In: Proceedings of the 2010 ACM workshop on Cloud computing security workshop, pp. 47–52. ACM, (2010)
Wang, G.; Liu, Q.; Wu, J.: Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: Proceedings of the 17th ACM conference on Computer and communications security, pp. 735–737. ACM, (2010)
Wang G., Liu Q., Wu J., Guo M.: Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur. 30(5), 320–331 (2011)
Wan Z., Liu J.E., Deng R.H.: Hasbe: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inform. Forensics Secur. 7(2), 743–754 (2012)
Hur J., Noh D. K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214–1221 (2011)
Li M., Yu S., Zheng Y., Ren K., Lou We.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131–143 (2013)
Yu, S.; Wang, C.; Ren, K.; Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, pp 1–9. IEEE, (2010)
Yu, S.; Wang, C.; Ren, K.; Lou, W.: Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 261–270. ACM, (2010)
Debiao H., Jianhua C., Jin H.: An id-based proxy signature schemes without bilinear pairings. Ann Telecommun Annales Des télé Communications 66(11-12), 657–662 (2011)
Ge, A.; Zhang, R.; Chen, C.; Ma, C.; Zhang, Z.: Threshold ciphertext policy attribute-based encryption with constant size ciphertexts. In: Information Security and Privacy, pp. 336–349. Springer, Berlin (2012)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Karati, A., Amin, R. & Biswas, G.P. Provably Secure Threshold-Based ABE Scheme Without Bilinear Map. Arab J Sci Eng 41, 3201–3213 (2016). https://doi.org/10.1007/s13369-016-2156-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13369-016-2156-9