Abstract

Device-to-device communication is considered as one of the hopeful technologies for proximal communication, which plays a vital role in the wireless systems and 5G cellular networks. The outsourced attribute-based encryption scheme is convinced to be very suitable for secure device-to-device communication since it allows not only fine-grained sharing of encrypted data but also achieves high efficiency in the decryption of general attribute-based encryption schemes. However, almost all existing outsourced attribute-based encryption schemes can hardly be applied directly in the device-to-device communication because many heavy computation operations, such as pairing and modular exponentiations, cannot be taken on the mobile devices in the device-to-device network. In this article, we propose a concept of outsourcing threshold decryption for attribute-based encryption and design a new efficient outsourcing threshold decryption scheme for ciphertext-policy attribute-based encryption. In our definition of outsourcing threshold decryption, the decryption, which is a computationally expensive operation, is outsourced to multiple semi-trusted and lightweight computing devices determined by an access structure and can be jointly taken by these devices. Our scheme supports proxy re-encryption which enables the decryption delegation. Finally, security and efficiency analyses of our proposed method indicate that our proposal guarantees strong security against chosen plaintext attacks and requires less outsourced computation and communication cost than the existing outsourced attribute-based encryption schemes.

Highlights

  • As one of the next-generation wireless communication systems, Long Term Evolution-Advanced (LTE-A) supports mobile content forwarding,[1] and the deviceto-device (D2D) technology is proposed as an indispensable component of 5G cellular networks to meet the growing demand for downloading required contents from the local area network.[2,3,4]

  • Some preliminaries are introduced in section ‘‘Preliminaries.’’ The definition and security model are given in section ‘‘Definition and security model for outsourcing threshold decryption (OTD) of CP-attribute-based encryption (ABE).’’ Our scheme construction is described in section ‘‘OTD of ciphertext-policy attribute-based encyption (CP-ABE) scheme.’’ The formal security and efficiency analyses of our scheme are present in section ‘‘Security and efficiency analysis.’’ the conclusion is drawn in section ‘‘Conclusion.’’

  • We propose an OTD for a ciphertext policy ABE scheme to relieve the problem of device restriction and particular outsourcing requirements in the D2D settings

Read more

Summary

Introduction

As one of the next-generation wireless communication systems, Long Term Evolution-Advanced (LTE-A) supports mobile content forwarding,[1] and the deviceto-device (D2D) technology is proposed as an indispensable component of 5G cellular networks to meet the growing demand for downloading required contents from the local area network.[2,3,4] D2D communication is the underlay of the cellular network to enhance spectrum efficiency and enable a lot of devices to link directly, which helps discover geographically dense devices and allows direct communication among these neighboring devices at low power through reuse of spectrum resources. For mobile applications in the D2D communication where users employ devices with[11,12] limited computing power, and short battery lifetime,[11] almost all existing public key encryption schemes cannot be applied directly due to the heavy computations required by the attribute-based encryption (ABE) schemes, such as pairing computations and modular exponentiations. Almost all existing ABE schemes involve pairing computations or modular exponentiations, and their computational complexity increases linearly with the amount of attributes, respectively, access policy size It means that the ABE scheme is representatively computationally intensive, which is acceptable for common desktop computers but not for restricted computational resources portable devices. Some preliminaries are introduced in section ‘‘Preliminaries.’’ The definition and security model are given in section ‘‘Definition and security model for OTD of CP-ABE.’’ Our scheme construction is described in section ‘‘OTD of CP-ABE scheme.’’ The formal security and efficiency analyses of our scheme are present in section ‘‘Security and efficiency analysis.’’ the conclusion is drawn in section ‘‘Conclusion.’’

Related work
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call