Abstract

Sharing photos on an open social platform with one-to-many features increases the leakage risk of information of the shared photos. Ciphertext-policy attribute-based encryption (CP-ABE) is a one-to-many public key cryptosystem, and its access policy can be set by data owners. Therefore, if we share the protected image on the social platform and encrypt the restoration parameters of the shared image with CP-ABE, then only the accessor whose attribute set satisfies the access policy of CP-ABE can decrypt the ciphertext corresponding to his/her attribute level and then restore the image with the corresponding sharpness level. Consequently, image information protection is realized in a one-to-many scenario. However, for the existing CP-ABE, only when further shortening its ciphertext, reducing the number of bilinear pairing calculations during decryption, and ensuring flexible access policies is it beneficial for CP-ABE to be widely used in popular smart terminals that can run social software. Furthermore, existing algorithms for restoring images also have room for improvement in terms of time and space requirements. For this reason, we propose a progressive image restoration strategy based on the improved CP-ABE in this paper. For the improvement of CP-ABE, we design a new encryption scheme to achieve a shorter constant-size ciphertext, construct an auxiliary function to help the independent authority centers generate private keys for users in new ways, design a decryption algorithm with only one bilinear pairing calculation, and provide the update algorithms for attribute revocation. Subsequently, we build a distributed CP-ABE based on our improved CP-ABE, and the correctness and security of the proposed CP-ABE algorithm are also proven. In addition, we follow the tree access policy to support the access policy, including AND, OR, NOT and threshold operations simultaneously, to adapt to the requirement of some user attributes that undergo frequent changes. Moreover, based on the atmospheric scattering model, we adopt three algorithms to restore the protected image in the dehazing mode according to the sharpness parameters. Compared with the existing literature, we provide users with not only a flexible and efficient access control strategy, shorter constant-size ciphertext and fewer bilinear calculations but also multiple algorithms for restoring images. The experimental results for six privilege levels demonstrate the superiority of our algorithms in protecting image information.

Highlights

  • More social software can run on smart devices, and an increasing number of functions are endowed to various social software, such as Twitter, QQ, and WeChat

  • If the picture is first protected and shared on the social platform, and the sharpness parameters of the picture are encrypted by Ciphertext-policy attribute-based encryption (CP-ABE), only the accessor who has the attribute set satisfying the access policy of CP-ABE can decrypt the ciphertext of sharpness parameters corresponding to his/her privilege level

  • OUR CONSTRUCTION OF CP-ABE we present the construction of our improved CP-ABE and use T to represent the access policy based on the tree access structure used in this paper

Read more

Summary

INTRODUCTION

More social software can run on smart devices, and an increasing number of functions are endowed to various social software, such as Twitter, QQ, and WeChat. After providing three algorithms for restoring the image, we design a progressively clear image restoration algorithm based on our distributed CP-ABE and the algorithms for restoring the image to protect the security of image information shared on a social platform. More than 6000 experiments demonstrate that our algorithms achieve the correct access control (that is, restore the corresponding sharpness parameters of images for users) and have a shorter constant-size ciphertext, constant bilinear pairing calculation during decryption, and good image restoration effect. The main contributions of this article are as follows: 1) A distributed CP-ABE is built based on our improved CP-ABE, which has a shorter constant-size ciphertext and only one bilinear pairing calculation when decrypting, and the update algorithms are provided to realize attribute revocation under the distributed CP-ABE scheme.

RELATED WORK
14: WAttTj γ
Findings
CONCLUSION AND FUTURE WORK
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call