Now, the Karatsuba algorithm recursively computes
the following three products:
• X(x) = A
0
(x) × B
0
(x)
• Y (x) = A
00
(x) × B
00
(x)
• Z(x) = (A
0
(x) + A
00
(x)) × (B
0
(x) + B
00
(x))
The product of A(x) and B(x) will be given by,
A(x) × B(x) = X(x) + x
n
0
/2
(Z(x) − X(x) −Y (x)) + x
n
0
Y (x)
The recurrence relation formulated to be:
T (n
0
) = 3T (n
0
/2) + O(n
0
)
So the time complexity for polynomial multiplication
by Karatsuba algorithm is O(n
0(log
2
(3))
) where n
0
is the
degree of polynomials.
Figure 1: Execution Time of different phases in proposed
scheme - Calculating coefficients of f (x) =
∏
n
0
k=1
(x + c
k
)
using Divide and conquer approach (Karatsuba Method) for
|U| = n
0
= 2000.
Figure 2: Execution time comparison of Dynamic Program-
ming algorithm and Karatsuba algorithm for all 5 phase to-
gether for |U| = n
0
= 4000.
6 CONCLUSION
With the boom in cloud-based applications and IoT
devices in the market, and an efficient CP-ABE
scheme is a necessity. We have proposed a secure
ECC based CP-ABE scheme with constant-size se-
cret keys. Further, we have also provided the security
analysis and the intuition for the same.
In this paper, we require a centralized server to
perform the Validate Phase. This, however, may be
the cause for a bottleneck or an extra overhead. For
future work, we can look into removing this validation
phase and thereby making the scheme more robust.
REFERENCES
Boneh, D. and Boyen, X. (2004). Efficient selective-id
secure identity-based encryption without random or-
acles.
Cheung, L. and Newport, C. (2007). Provably secure ci-
phertext policy abe. In Proceedings of the 14th ACM
Conference on Computer and Communications Secu-
rity, CCS ’07, pages 456–465, New York, NY, USA.
ACM.
D.Pharkkavi and Maruthanayagam, D. D. (2018). Time
complexity analysis of rsa and ecc based security al-
gorithms in cloud data. International Journal of Ad-
vanced Research in Computer Science, 9(3).
Guo, F., Mu, Y., Susilo, W., Wong, D. S., and Varadhara-
jan, V. (2014). Cp-abe with constant-size keys for
lightweight devices. IEEE Transactions on Informa-
tion Forensics and Security, 9(5):763–771.
Herranz, J. (2017). Attribute-based encryption implies
identity-based encryption. IET Information Security,
11(6):332–337.
Li, H., Lin, X., Yang, H., Liang, X., Lu, R., and Shen, X.
(2014). Eppdr: An efficient privacy-preserving de-
mand response scheme with adaptive key evolution in
smart grid. IEEE Transactions on Parallel and Dis-
tributed Systems, 25(8):2053–2064.
Odelu, V., Das, A. K., and Goswami, A. (2016). An effi-
cient cp-abe with constant size secret keys using ecc
for lightweight devices. ACM, 9(17):4048–4059.
Sahai, A. and Waters, B. (2005). Fuzzy identity-based en-
cryption. In Proceedings of the 24th Annual Inter-
national Conference on Theory and Applications of
Cryptographic Techniques, EUROCRYPT’05, pages
457–473, Berlin, Heidelberg. Springer-Verlag.
Vergnaud, D. (2016). Comment on ”a strong provably se-
cure ibe scheme without bilinear map” by m. zheng,
y. xiang and h. zhou j. comput. syst. sci. 81 (2015)
125-131. J. Comput. Syst. Sci., 82(5):756–757.
Zhang, Y., Zheng, D., Chen, X., Li, J., and Li, H. (2014).
Computationally efficient ciphertext-policy attribute-
based encryption with constant-size ciphertexts. In
Chow, S. S. M., Liu, J. K., Hui, L. C. K., and Yiu,
S. M., editors, Provable Security, pages 259–273,
Cham. Springer International Publishing.
SECRYPT 2020 - 17th International Conference on Security and Cryptography
540