DocumentCode :
1799746
Title :
A Practically Optimized Implementation of Attribute Based Cryptosystems
Author :
Chunqiang Hu ; Fan Zhang ; Tao Xiang ; Hongjuan Li ; Xiao Xiao ; Guilin Huang
Author_Institution :
Dept. of Comput. Sci., George Washington Univ., Washington, DC, USA
fYear :
2014
fDate :
24-26 Sept. 2014
Firstpage :
197
Lastpage :
204
Abstract :
Attribute based encryption (ABE) has been applied to many applications nowadays [1][2] and it effectively achieves a fine grained access control. Even the encryptor needs only one encryption operation, and all the decryption operations are distributed to the receiver´s end, the computational cost of encryption is still impractical when there is a large amount of encryption with different access structures. In this paper, we examine existing techniques that optimize the decentralized attribute based encryption scheme [3], such as a better construction of e Linear Secret-Sharing Scheme (LSSS) matrix, pre-processing of scalar multiplication and pairing, multi-pairing and so on. We proposed the deployment of offline pools to improve the real-time operations. We proposed the method to construct offline pools and designed algorithms to achieve better hitting rate of offline pool topples. We evaluated the optimization techniques, the result shows that there is a 45 times of performance improvement in the encryption (6-8 times for the decryption) after we applied all the real-time optimization techniques mentioned in our paper. With deployment of the offline pools, the optimization can be improved at least 100-200 times than without offline pools.
Keywords :
authorisation; optimisation; public key cryptography; ABE; LSSS matrix; access structures; attribute based cryptosystems; decentralized attribute based encryption scheme optimization; decryption operation; encryption computational cost; encryption operation; fine-grained access control; linear secret-sharing scheme; multipairing; offline pool tuples; optimized implementation; real-time operation improvement; real-time optimization technique evaluation; receiver end; scalar multiplication preprocessing; scalar pairing preprocessing; Computational efficiency; Encryption; Libraries; Matrix converters; Optimization; Real-time systems; Attribute based encryption; offline optimization; optimization of scalar multiplication and pairing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on
Conference_Location :
Beijing
Type :
conf
DOI :
10.1109/TrustCom.2014.29
Filename :
7011251
Link To Document :
بازگشت