An Improved Encryption Scheme of Short Message Based On CP-ABE
DOI: 10.23977/jnca.2016.11006 | Downloads: 39 | Views: 4247
Wenna Song 1, Guangli Xiang 1, Yuexin Zhang 1
1 Wuhan University of Technology, Wuhan 410000, China
Corresponding AuthorGuangli Xiang
In order to solve the problem of short message sharing in multi-user environment, we improve the existing CP-ABE encryption scheme, and propose a high efficient encryption scheme for short message protection. To improve the decryption efficiency, we reduce the number of bilinear operations to a fixed range in the decryption operation. And we use the security model which resists in distinguish ability chosen plaintext attacks in the CP-ABE encryption scheme to carry out a safety proof. Several experiments show that the encryption scheme performs with high efficiency and remains sufficient security.
KEYWORDSCP-ABE; the short ciphertext; Ciphertext sharing of multi-users; the security model; distinguish ability chosen plaintext attacks
CITE THIS PAPER
Guangli, X. , Yuexin, Z. and Wenna, S. (2016) An Improved Encryption Scheme of Short Message Based On CP-ABE. Journal of Network Computing and Applications (2016) 1: 33-41.
 Liu Hui and Wang Jing, “End-to-end security short message system based on public key encryption[EB/OL],” Beijing:Sciencepaper Online, 2007.
 Sun Yuze, Chi Jia, and Hu Liang, “Based on the DES encryption algorithm to encrypt communications between the server and the Android client,” Journal of Northeast Normal University(Natural Science Edition) , 47(3), pp. 78-82, 2015.
 Kiah M L M and Al-Bakri S H, “A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael,” Scientific Research & Essays, 2(22), pp. 3455-3466, 2010.
 A. Sahai and B. Waters, “Fuzzy Identity-Based Encryption,” In EUROCRYPT 2005, LNCS 3494, Springer, pp. 457-473, 2005.
 Herranz J, Laguillaumie F, and Ràfols C, “Constant Size Ciphertexts in Threshold Attribute-Based Encryption,” Public Key Cryptography – PKC 2010. Springer Berlin Heidelberg, pp.19-34, 2010
 Bethencourt, A.Sahai, and B.Waters, “Ciphertext-Policy Attribute-BasedEncryption,” In IEEE Symposium on Security and Privacy, IEEE ConputerSociety, Los Alamitos (2007), pp.321-334, 2007.
 Li M, Yu S, Zheng Y, Ren K, and Low W, “ Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption,” Parallel and Distributed Systems, IEEE Transactions on, 24(1), pp.131-143, 2013.
 Chen Yan li, Du Ying jie, and Yang Geng, “Efficient Attribute-based Authenticated Key Agreement Protocol,” 4(41), pp.150-154,177, 2014.
 Karchmer M and Wigderson A, “On span programs: Structure in complexity theory conference, ” San Diego, California:Proceedings of the Eighth Annual. IEEE, pp.102-111, 1993.
 Zhen Liu and Zhenfu Cao, “On efficiently transferring the linear secret-sharing scheme matrix in ciphertext-policy attribute-based encryption,” Iacr Cryptology Eprint Archive +, 2010.
 Dan B and Franklin M, “ Identity based encryption from the Weil pairing: Advances in Cryptology — CRYPTO 2001,” Lecture Notes in Computer Science, 32(3), pp.213-229, 2003
 Chen Yanli,Du yingjie,Yang yu “ Efficient Attributebased Authenticated Key Agreement Protocol,” Computer Science, 4(41),pp.150-154, 2014.