{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:13:56Z","timestamp":1761621236110,"version":"build-2065373602"},"reference-count":22,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2015,10,29]],"date-time":"2015-10-29T00:00:00Z","timestamp":1446076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>Cloud storage is widely used by organizations due to its advantage of allowing universal access with low cost. Attribute-based encryption (ABE) is a kind of public key encryption suitable for cloud storage. The secret key of each user and the ciphertext are associated with an access policy and an attribute set, respectively; in addition to holding a secret key, one can decrypt a ciphertext only if the associated attributes match the predetermined access policy, which allows one to enforce fine-grained access control on outsourced files. One issue in existing ABE schemes is that they are designed for the users of a single organization. When one wants to share the data with the users of different organizations, the owner needs to encrypt the messages to the receivers of one organization and then repeats this process for another organization. This situation is deteriorated with more and more mobile devices using cloud services, as the ABE encryption process is time consuming and may exhaust the power supplies of the mobile devices quickly. In this paper, we propose a batch attribute-based encryption (BABE) approach to address this problem in a provably-secure way. With our approach, the data owner can outsource data in batches to the users of different organizations simultaneously. The data owner is allowed to decide the receiving organizations and the attributes required for decryption. Theoretical and experimental analyses show that our approach is more efficient than traditional encryption implementations in computation and communication.<\/jats:p>","DOI":"10.3390\/info6040704","type":"journal-article","created":{"date-parts":[[2015,10,29]],"date-time":"2015-10-29T11:16:47Z","timestamp":1446117407000},"page":"704-718","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Batch Attribute-Based Encryption for Secure Clouds"],"prefix":"10.3390","volume":"6","author":[{"given":"Chen","family":"Yang","sequence":"first","affiliation":[{"name":"China Information Security Research Institute, No. 11 ShangDi Xinxi Road, Beijing 100085, China"}]},{"given":"Yang","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Engineering, Beihang University, XueYuan Road No.37, Haidian District, Beijing 100191, China"}]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Engineering, Beihang University, XueYuan Road No.37, Haidian District, Beijing 100191, China"}]}],"member":"1968","published-online":{"date-parts":[[2015,10,29]]},"reference":[{"key":"ref_1","first-page":"457","article-title":"Fuzzy identity-based encryption","volume":"Volume 3494","author":"Sahai","year":"2005","journal-title":"Advances in Cryptology\u2014EUROCRYPT 2005, Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1007\/978-3-642-36362-7_11","article-title":"Attribute-based encryption with fast decryption","volume":"Volume 7778","author":"Hohenberger","year":"2013","journal-title":"Public-Key Cryptography\u2013PKC 2013, Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography"},{"key":"ref_3","unstructured":"Goyal, V., Pandey, O., Sahai, A., and Waters, B. (November, January 30). Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandri, VA, USA."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., and Waters, B. (2007, January 20\u201323). Ciphertext-policy attribute-based encryption. Proceedings of the SP\u201907 IEEE Symposium on Security and Privacy, Berkeley, CA, USA.","DOI":"10.1109\/SP.2007.11"},{"key":"ref_5","first-page":"53","article-title":"Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization","volume":"Volume 6571","author":"Waters","year":"2011","journal-title":"Public Key Cryptography (PKC) 2011, Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., and Lou, W. (2010, January 14\u201319). Achieving secure, scalable, and fine-grained data access control in cloud computing. Proceedings of the IEEE INFOCOM, San Diego, CA, USA.","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"ref_7","first-page":"515","article-title":"Multi-authority attribute based encryption","volume":"Volume 4392","author":"Chase","year":"2007","journal-title":"Theory of Cryptography, Proceedings of the 4th Theory of Cryptography Conference, TCC 2007"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Chase, M., and Chow, S.S. (2009, January 9\u201313). Improving privacy and security in multi-authority attribute-based encryption. Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL, USA.","DOI":"10.1145\/1653662.1653678"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Yang, K., and Jia, X. (2012, January 18\u201321). Attributed-based access control for multi-authority systems in cloud storage. Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS), Macau, China.","DOI":"10.1109\/ICDCS.2012.42"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Li, J., Huang, Q., Chen, X., Chow, S.S., Wong, D.S., and Xie, D. (2011, January 22\u201324). Multi-authority ciphertext-policy attribute-based encryption with accountability. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, China.","DOI":"10.1145\/1966913.1966964"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1007\/978-3-642-19379-8_6","article-title":"Expressive key-policy attribute-based encryption with constant-size ciphertexts","volume":"Volume 6571","author":"Attrapadung","year":"2011","journal-title":"Public Key Cryptography\u2013PKC 2011, Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.tcs.2011.12.004","article-title":"Attribute-based encryption schemes with constant-size ciphertexts","volume":"422","author":"Attrapadung","year":"2012","journal-title":"Theor. Comput. Sci."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/0-387-34805-0_17","article-title":"Batch rsa","volume":"Volume 435","author":"Fiat","year":"1990","journal-title":"Advances in Cryptology CRYPTO 89 Proceedings"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1007\/BFb0054130","article-title":"Fast batch verification for modular exponentiation and digital signatures","volume":"Volume 1403","author":"Bellare","year":"1998","journal-title":"Advances in Cryptology EUROCRYPT 98, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques Espoo"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Zhang, C., Lu, R., Lin, X., Ho, P.H., and Shen, X. (2008, January 13\u201318). An efficient identity-based batch verification scheme for vehicular sensor networks. Proceedings of the IEEE INFOCOM 2008, the 27th Conference on Computer Communications, Phoenix, AZ, USA.","DOI":"10.1109\/INFOCOM.2008.58"},{"key":"ref_16","first-page":"309","article-title":"Practical short signature batch verification","volume":"Volume 5473","author":"Ferrara","year":"2009","journal-title":"Topics in Cryptology\u2014CT-RSA 2009, Proceedings of the The Cryptographers\u2019 Track at the RSA Conference 2009"},{"key":"ref_17","first-page":"246","article-title":"Batch verification of short signatures","volume":"Volume 4515","author":"Camenisch","year":"2007","journal-title":"Advances in Cryptology\u2014EUROCRYPT 2007, Proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref_18","first-page":"195","article-title":"Efficient and provably secure multi-receiver identity-based signcryption","volume":"Volume 4058","author":"Duan","year":"2006","journal-title":"Information Security and Privacy, Proceedings of the 11th Australasian Conference, ACISP 2006"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1007\/978-3-540-30580-4_26","article-title":"Efficient multi-receiver identity-based encryption and its application to broadcast encryption","volume":"Volume 3386","author":"Baek","year":"2005","journal-title":"Public Key Cryptography-PKC 2005, Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography"},{"key":"ref_20","unstructured":"Beimel, A. (1996). Secure Schemes for Secret Sharing and Key Distribution. [Ph.D. Thesis, Technion-Israel Institute of Technology]."},{"key":"ref_21","first-page":"440","article-title":"Hierarchical identity based encryption with constant size ciphertext","volume":"Volume 3494","author":"Boneh","year":"2005","journal-title":"Advances in Cryptology\u2013EUROCRYPT 2005, Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/11535218_16","article-title":"Collusion resistant broadcast encryption with short ciphertexts and private keys","volume":"Volume 3621","author":"Boneh","year":"2005","journal-title":"Advances in Cryptology\u2013CRYPTO 2005, Proceedings of the 25th Annual International Cryptology Conference"}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/6\/4\/704\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T20:51:08Z","timestamp":1760215868000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/6\/4\/704"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,29]]},"references-count":22,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2015,12]]}},"alternative-id":["info6040704"],"URL":"https:\/\/doi.org\/10.3390\/info6040704","relation":{},"ISSN":["2078-2489"],"issn-type":[{"type":"electronic","value":"2078-2489"}],"subject":[],"published":{"date-parts":[[2015,10,29]]}}}