
using laptop configuration of Intel Core i5-1135G7 @
2.40 GHz, 8 GB RAM. For communication overhead,
|G|, |G
T
, |P|, and |Z
q
| denotes size of elements in
G, G
T
, ECC point and random element in Z
q
. |G|,
|G
T
|, |P| and |Z
q
| are 1024 bits, 2048 bits, 320 bits
and 160 bits, respectively. ECC-CP-ABPRE incurs
less communication overhead to send rk and CT com-
pared with (Yang et al., 2016; Deng et al., 2020; Ge
et al., 2021; Zhou et al., 2021; Chen et al., 2022) as
in Fig. 2(a) and 2(b), respectively. To transmit CT
′
,
ECC-CP-ABPRE performs better than (Yang et al.,
2016; Ge et al., 2021; Zhou et al., 2021; Chen et al.,
2022) as in Fig. 2(c) however, it is increased com-
pared with (Deng et al., 2020) as latter scheme lever-
ages PS to perform partial decryption of ciphertext in
re-encryption. To transmit public key and secret key
as in Fig. 2(d) and 2(e), ECC-CP-ABPRE increases
by ≈320n bits and ≈160n
′
bits, respectively, com-
pared to (Yang et al., 2016; Chen et al., 2022). This
can be circumvented as AA transmits these keys once
during system initialization and user registration.
For computational overhead comparison, T
EX P
,
T
GM
, T
BP
, T
SM
and T
PA
represent as time for expo-
nential operation in G, multiplication operation in G,
bilinear pairing, scalar multiplication, and point addi-
tion in ECC, respectively. T
EX P
, T
GM
, T
BP
, T
SM
and
T
PA
are 0.0765 sec, 0.0118 sec, 0.1099 sec, 0.0220
sec and 0.0002 sec, respectively. ECC-CP-ABPRE
requires significantly less computation overhead than
(Yang et al., 2016; Deng et al., 2020; Ge et al., 2021;
Zhou et al., 2021; Chen et al., 2022) to encrypt plain-
text, decrypt original ciphertext and re-encrypt ci-
phertext as shown in Fig. 3(a), 3(b), and 3(c) re-
spectively. To decrypt CT
′
, ECC-CP-ABPRE out-
performs (Yang et al., 2016; Ge et al., 2021; Zhou
et al., 2021; Chen et al., 2022) as in Fig. 3(d). How-
ever, computational overhead in (Deng et al., 2020) is
less than ECC-CP-ABPRE as it leverages PS to par-
tially decrypt CT in re-encryption phase. Nonethe-
less, computational overhead in re-encryption phase
is significantly increased as PS performs both re-
encryption and partial decryption of CT as in Fig.
3(c). Hence, the overall computational overhead of
ECC-CP-ABPRE is less than (Deng et al., 2020).
Thus, the overall efficiency of ECC-CP-ABPRE sur-
passes (Yang et al., 2016; Deng et al., 2020; Ge et al.,
2021; Zhou et al., 2021; Chen et al., 2022) in terms of
communication and computational overheads.
9 CONCLUSION
This paper designs a novel pairing-free ECC-based
CP-ABPRE to enable efficient sharing of encrypted
data in clouds. ECC-CP-ABPRE replaces expensive
bilinear pairing operations with scalar multiplications
to update ciphertext-policy. The security analysis il-
lustrates semantic security of both original ciphertext
and re-encrypted ciphertext under DDH assumption.
It ensures data confidentiality and specificity of re-
encryption keys while resisting collusion attack. The
performance results demonstrate its efficiency. In fu-
ture, ECC-CP-ABPRE will be extended to trace and
revoke malicious data users leaking their secret keys
to unauthorized users in the system.
REFERENCES
Beimel, A. (1996). Secure schemes for secret sharing and
key distribution. Technion-Israel Institute of technol-
ogy, Faculty of Computer Science.
Bethencourt, J., Sahai, A., and Waters, B. (2007).
Ciphertext-policy attribute-based encryption. In 2007
IEEE symposium on security and privacy (SP’07),
pages 321–334. IEEE.
Chen, J., Wang, J., Yin, X., and Ning, J. (2022). A fine-
grained medical data sharing scheme with ciphertext
reencryption. Wireless Communications and Mobile
Computing, 2022.
De Caro, A. and Iovino, V. (2011). jpbc: Java pairing based
cryptography. In 2011 IEEE symposium on computers
and communications (ISCC), pages 850–855. IEEE.
Deng, H., Qin, Z., Wu, Q., Guan, Z., and Zhou, Y. (2020).
Flexible attribute-based proxy re-encryption for effi-
cient data sharing. Information Sciences, 511:94–113.
Dhakad, N. and Kar, J. (2022). Eppdp: An efficient privacy-
preserving data possession with provable security in
cloud storage. IEEE Systems Journal.
Ge, C., Susilo, W., Baek, J., Liu, Z., Xia, J., and Fang, L.
(2021). A verifiable and fair attribute-based proxy re-
encryption scheme for data sharing in clouds. IEEE
Transactions on Dependable and Secure Computing.
Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S.,
Yang, G., Yu, Y., and Yang, A. (2015). A secure
and efficient ciphertext-policy attribute-based proxy
re-encryption for cloud data sharing. Future Gener-
ation Computer Systems, 52:95–108.
Liang, X., Cao, Z., Lin, H., and Shao, J. (2009). Attribute
based proxy re-encryption with delegating capabili-
ties. In Proceedings of the 4th International Sympo-
sium on Information, Computer, and Communications
Security, pages 276–286.
Luo, S., Hu, J., and Chen, Z. (2010). Ciphertext policy
attribute-based proxy re-encryption. In International
Conference on Information and Communications Se-
curity, pages 401–415. Springer.
Miller, V. S. (1985). Use of elliptic curves in cryptogra-
phy. In Conference on the theory and application of
cryptographic techniques, pages 417–426. Springer.
Rezaeibagha, F., Mu, Y., Huang, K., Chen, L., and Zhang,
L. (2021). Toward secure data computation and out-
ICISSP 2025 - 11th International Conference on Information Systems Security and Privacy
232