An Improved Encryption Scheme of Short Message Based On CP-ABE
DOI: 10.23977/jnca.2016.11006 | Downloads: 41 | Views: 7103
Author(s)
Wenna Song 1, Guangli Xiang 1, Yuexin Zhang 1
Affiliation(s)
1 Wuhan University of Technology, Wuhan 410000, China
Corresponding Author
Guangli XiangABSTRACT
In order to solve the problem of short message sharing in multi-user environment, we improve the existing CP-ABE encryption scheme, and propose a high efficient encryption scheme for short message protection. To improve the decryption efficiency, we reduce the number of bilinear operations to a fixed range in the decryption operation. And we use the security model which resists in distinguish ability chosen plaintext attacks in the CP-ABE encryption scheme to carry out a safety proof. Several experiments show that the encryption scheme performs with high efficiency and remains sufficient security.
KEYWORDS
CP-ABE; the short ciphertext; Ciphertext sharing of multi-users; the security model; distinguish ability chosen plaintext attacksCITE THIS PAPER
Guangli, X. , Yuexin, Z. and Wenna, S. (2016) An Improved Encryption Scheme of Short Message Based On CP-ABE. Journal of Network Computing and Applications (2016) 1: 33-41.
REFERENCES
[1] Liu Hui and Wang Jing, “End-to-end security short message system based on public key encryption[EB/OL],” Beijing:Sciencepaper Online, 2007.
[2] Sun Yuze, Chi Jia, and Hu Liang, “Based on the DES encryption algorithm to encrypt communications between the server and the Android client,” Journal of Northeast Normal University(Natural Science Edition) , 47(3), pp. 78-82, 2015.
[3] Kiah M L M and Al-Bakri S H, “A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael,” Scientific Research & Essays, 2(22), pp. 3455-3466, 2010.
[4] A. Sahai and B. Waters, “Fuzzy Identity-Based Encryption,” In EUROCRYPT 2005, LNCS 3494, Springer, pp. 457-473, 2005.
[5] Herranz J, Laguillaumie F, and Ràfols C, “Constant Size Ciphertexts in Threshold Attribute-Based Encryption,” Public Key Cryptography – PKC 2010. Springer Berlin Heidelberg, pp.19-34, 2010
[6] Bethencourt, A.Sahai, and B.Waters, “Ciphertext-Policy Attribute-BasedEncryption,” In IEEE Symposium on Security and Privacy, IEEE ConputerSociety, Los Alamitos (2007), pp.321-334, 2007.
[7] Li M, Yu S, Zheng Y, Ren K, and Low W, “ Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption,” Parallel and Distributed Systems, IEEE Transactions on, 24(1), pp.131-143, 2013.
[8] Chen Yan li, Du Ying jie, and Yang Geng, “Efficient Attribute-based Authenticated Key Agreement Protocol,” 4(41), pp.150-154,177, 2014.
[9] Karchmer M and Wigderson A, “On span programs: Structure in complexity theory conference, ” San Diego, California:Proceedings of the Eighth Annual. IEEE, pp.102-111, 1993.
[10] Zhen Liu and Zhenfu Cao, “On efficiently transferring the linear secret-sharing scheme matrix in ciphertext-policy attribute-based encryption,” Iacr Cryptology Eprint Archive +, 2010.
[11] Dan B and Franklin M, “ Identity based encryption from the Weil pairing: Advances in Cryptology — CRYPTO 2001,” Lecture Notes in Computer Science, 32(3), pp.213-229, 2003
[12] Chen Yanli,Du yingjie,Yang yu “ Efficient Attributebased Authenticated Key Agreement Protocol,” Computer Science, 4(41),pp.150-154, 2014.
Downloads: | 1402 |
---|---|
Visits: | 132613 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Advances in Computer, Signals and Systems
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks