• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhao Zhiyuan, Wang Jianhua, Zhu Zhiqiang, Sun Lei. Attribute-Based Encryption for Data Security Sharing of Internet of Things[J]. Journal of Computer Research and Development, 2019, 56(6): 1290-1301. DOI: 10.7544/issn1000-1239.2019.20180288
Citation: Zhao Zhiyuan, Wang Jianhua, Zhu Zhiqiang, Sun Lei. Attribute-Based Encryption for Data Security Sharing of Internet of Things[J]. Journal of Computer Research and Development, 2019, 56(6): 1290-1301. DOI: 10.7544/issn1000-1239.2019.20180288

Attribute-Based Encryption for Data Security Sharing of Internet of Things

Funds: This work was supported by the National Basic Research Program of China (973 Program) (2013CB338000) and the National Key Research and Development Program of China (2016YFB0501900).
More Information
  • Published Date: May 31, 2019
  • The development of Internet of things (IoT) has always been faced with serious security threats and challenges. The security sharing and fine-grained access control of data in the IoT is one of the security issues that urgently need to deal with. In order to solve this problem, an attribute-based encryption (ABE) scheme with the hidden access structure for data security sharing of IoT is proposed. This scheme can achieve fine-grained access control of ciphertext and guarantee data privacy. In this paper, a universal method to convert identity-based encryption (IBE) into ciphertext-policy attribute-based encryption (CP-ABE) is proposed, which supports AND-gate access structure with multiple values. The converted CP-ABE can inherit the characteristics of IBE. Then, the receiver anonymous IBE scheme proposed by Wee is converted to the CP-ABE scheme with the hidden access structure based on the conversion method, which realizes the fixed length of ciphertext, user secret key, public key and master secret key, and only needs one bilinear pairing computation in the decryption phase. The converted scheme is applied to the intelligent medical application scene and the system model and application steps are given. Finally, the results of theoretical analysis and experimental simulation show that the proposed scheme implements the hidden access structure and has advantages in computing efficiency, storage burden and security. It is more efficient and secure when the scheme is applied to the IoT environment.
  • Related Articles

    [1]Zhou Quan, Chen Minhui, Wei Kaijun, Zheng Yulong. Traceable Attribute-Based Signature for SM9-Based Support Policy Hidden[J]. Journal of Computer Research and Development, 2025, 62(4): 1065-1074. DOI: 10.7544/issn1000-1239.202330744
    [2]Shen Yuan, Song Wei, Zhao Changsheng, Peng Zhiyong. A Cross-Domain Ciphertext Sharing Scheme Supporting Access Behavior Identity Tracing[J]. Journal of Computer Research and Development, 2024, 61(7): 1611-1628. DOI: 10.7544/issn1000-1239.202330618
    [3]Zhang Xuewang, Yao Yaning, Fu Jiali, Xie Haofei. Efficient Multi-Authority CP-ABE IoT Data Sharing Scheme with Hidden Policies[J]. Journal of Computer Research and Development, 2023, 60(10): 2193-2202. DOI: 10.7544/issn1000-1239.202330459
    [4]Wang Yue, Fan Kai. Effective CP-ABE with Hidden Access Policy[J]. Journal of Computer Research and Development, 2019, 56(10): 2151-2159. DOI: 10.7544/issn1000-1239.2019.20190343
    [5]Wu Guangqiang. Multi-Authority CP-ABE with Policy Update in Cloud Storage[J]. Journal of Computer Research and Development, 2016, 53(10): 2393-2399. DOI: 10.7544/issn1000-1239.2016.20160432
    [6]Chen Dongdong, Cao Zhenfu, Dong Xiaolei. Online/Offline Ciphertext-Policy Attribute-Based Searchable Encryption[J]. Journal of Computer Research and Development, 2016, 53(10): 2365-2375. DOI: 10.7544/issn1000-1239.2016.20160416
    [7]Wang Hao, Zheng Zhihua, Wu Lei, Wang Yilei. Adaptively Secure Outsourcing Ciphertext-Policy Attribute-Based Encryption[J]. Journal of Computer Research and Development, 2015, 52(10): 2270-2280. DOI: 10.7544/issn1000-1239.2015.20150497
    [8]Xiong Jinbo, Yao Zhiqiang, Ma Jianfeng, Li Fenghua, Li Qi. Action-Based Multilevel Access Control for Structured Document[J]. Journal of Computer Research and Development, 2013, 50(7): 1399-1408.
    [9]Zhang Haibo, Wang Xiaofei, and Huang Youpeng. General Results on Secret Sharing Based on General Access Structure[J]. Journal of Computer Research and Development, 2010, 47(2): 207-215.
    [10]Pang Liaojun, Jiang Zhengtao, and Wang Yumin. A Multi-Secret Sharing Scheme Based on the General Access Structure[J]. Journal of Computer Research and Development, 2006, 43(1): 33-38.

Catalog

    Article views (1459) PDF downloads (679) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return