Font Size: a A A

On The Performance Of Attribute-Based Encryption

Posted on:2018-03-29Degree:MasterType:Thesis
Country:ChinaCandidate:L L JiaoFull Text:PDF
GTID:2348330518999541Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Attribute-based encryption is an effective,one-to-many network communication technology and supports flexible access control policies,so it is regarded as a fine-grained access control mechanism in large information systems.Ever since the concept of attribute-based encryption was proposed,most of the prior related works are limited to theoretical research,and it is imperative to carry out comprehensive and in-depth performance analysis of attribute-based encryption schemes to promote its development in application fields.In this thesis,after the in-depth study of attribute-based encryption and considering the actual needs of engineering applications,we decide to study some attribute revocation ABE schemes and outsourced ABE schemes.The impact of security level and the number of attributes on the performance of the ABE algorithms is studied from the time overhead,communication overhead,CPU and memory costs and some other aspects.The work carried out in this thesis is as follows:First,based on the deep analysis of the access structure,especially the linear secret sharing scheme,by combining the method of converting boolean formulas into LSSS matrices,we construct the LSSS matrix from a string policy.After the minimum attribute set satisfying the access structure is obtained,constant coefficients can be computed to recover the secret.Then we encapsulate the implemented codes into a reusable LSSS library.Second,on the basis of deep analysis of revocable attribute-based encryption,we select four representative revocable ABE schemes to fully analyze and summarize the performance of each of them based on the Windows platform,providing visual performance analysis results.The codes are then packaged into attribute-based encryption library both on Windows and Linux platforms,hence providing the necessary data types and an abstract easy-to-use application programming interface.Third,we consider the large computational cost of ABE schemes running on resource-constrained devices and select two representative outsourced attribute-based encryption schemes to make a comprehensive analysis of performance of the OABE.We utilize visual charts to depict the analysis on the Windows platform.The final implementation of the codes are then packaged into attribute-based encryption library both on Windows and Linux platforms,thereby providing a simple easy-to-use function interface.The performance analysis of ABE in this thesis is useful for the evaluation and selection of ABE schemes in engineering applications.The LSSS library and the attribute-based encryption library could facilitate the performance analysis of ABE schemes.Both Windows and Linux platforms are supported by the custom attribute-based encryption library,which makes it easy for developers to deploy attribute-based encryption schemes in practical engineering applications.
Keywords/Search Tags:Attribute-based encryption, Performance analysis, Attribute revocation, Outsourced computation, Attribute-based encryption library
PDF Full Text Request
Related items