Affiliation:
1. School of Software Engineering, Tongji University, Shanghai, China
2. School of Software Engineering, Tongji University, Shanghai China
Abstract
With the rapid growth of wireless sensor networks, secure data transmission, storage, and distribution in such networks has become an urgent demand. To defend against security risks such as data leakage, key compromise, and unauthorized misuse of data simultaneously, we propose a novel obfuscatable ciphertext-policy attribute-based re-encryption scheme with a specially designed obfuscator. The proposed scheme leverages program obfuscation to transform the re-encryption program codes into an unintelligible form and embed the private keys into the obfuscated implementation. Consequently, the proposed scheme protects data confidentiality, keeps the secrecy of the private key, meanwhile provides fine-grained access control. Formal proofs for the security of the proposed re-encryption scheme and the obfuscator are provided. Extensive experiments have been conducted on representative platforms, including cloud servers, workstations, and embedded devices to evaluate the computational efficiency and energy consumption of the scheme. Experimental results indicate that the scheme achieves high efficiency on various platforms and economic energy consumption on typical embedded devices with constrained resources.
Publisher
Association for Computing Machinery (ACM)
Reference55 articles.
1. Edge Computing for Smart Health: Context-Aware Approaches, Opportunities, and Challenges
2. Improved proxy re-encryption schemes with applications to secure distributed storage
3. Boaz Barak, Oded Goldreich, Rusell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, and Ke Yang. 2001. On the (im) possibility of obfuscating programs. In Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19–23, 2001 Proceedings. Springer, 1–18.
4. Amos Beimel. 1996. Secure schemes for secret sharing and key distribution [Ph. D. Thesis]. Haifa: Israel Institute of Technology(1996).
5. Ciphertext-Policy Attribute-Based Encryption