Attribute-based Encryption with Outsourced Computation for Access Control in IoTs

Xuanmei Qin,Zhen Yang,Qi Li,Hongyun Pan,Zhongliang Yang,Yongfeng Huang
DOI: https://doi.org/10.1145/3523181.3523191
2022-01-01
Abstract:There are many terminal devices with constrained computing resources in the IoT environment. The traditional lightweight attribute-based encryption schemes adopt third-party outsourcing computing to meet the lightweight access control requirements of constrained devices, but the correctness of outsourcing computing results is difficult to guarantee. To solve this problem, a lightweight attribute-based encryption scheme based on blockchain technology was proposed to realize outsourcing decryption based on the blockchain. However, the computational complexity of encryption process is much higher than that of the decryption process in attribute-based encryption schemes. This paper extends and improves the related work to further achieve outsourcing encryption based on blockchain. The proposed method can effectively reduce the burden of encryption computation on the user side.
What problem does this paper attempt to address?