Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing

被引:0
|
作者
Zhao, Xiaolong [1 ,2 ]
Huang, Zhenjie [1 ,2 ]
机构
[1] Minnan Normal Univ, Fujian Key Lab Granular Comp & Applicat, Zhangzhou 363000, Fujian, Peoples R China
[2] Minnan Normal Univ, Sch Math & Stat, Zhangzhou 363000, Fujian, Peoples R China
基金
中国国家社会科学基金;
关键词
Attribute-based encryption; Cloud data sharing; Fully outsourced; Fully verifiable; Key-policy; ACCESS-CONTROL; SCHEME;
D O I
10.1007/s10586-024-04423-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Verifiable outsourced attribute-based encryption (VO-ABE) enables one-to-many data sharing and fine-grained access control under lower trust, making it suitable for cloud or edge systems involving resource-constrained devices. There is no fully outsourced and fully verifiable attribute-based encryption scheme or key-policy VO-ABE scheme. Moreover, the previous VO-ABE schemes require multiple rounds of interaction or high verification costs to support verifiable outsourced key generation and verifiable outsourced encryption. To address these issues, in this paper, we propose an effective key-policy fully outsourced and fully verifiable attribute-based encryption scheme supporting verifiable outsourced key generation, encryption, and decryption simultaneously. We formally define two new properties: outsourced key generation verifiability and outsourced encryption verifiability. Analysis and simulation show that the proposed scheme performs well and is practical. All local computational overheads of the proposed scheme are constant and do not increase with the number of attributes or the complexity of access structures.
引用
收藏
页码:10437 / 10453
页数:17
相关论文
共 50 条
  • [1] Fully Outsourced Attribute-Based Encryption with Verifiability for Cloud Storage
    Zhao, Zhiyuan
    Wang, Jianhua
    Xu, Kaiyong
    Guo, Songhui
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (02): : 442 - 452
  • [2] Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing
    Kibiwott, Kittur Philemon
    Zhao, Yanan
    Kogo, Julius
    Zhang, Fengli
    [J]. MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (05) : 3561 - 3594
  • [3] Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption
    Jing Li
    Xiong Li
    Licheng Wang
    Debiao He
    Haseeb Ahmad
    Xinxin Niu
    [J]. Soft Computing, 2018, 22 : 707 - 714
  • [4] Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption
    Li, Jing
    Li, Xiong
    Wang, Licheng
    He, Debiao
    Ahmad, Haseeb
    Niu, Xinxin
    [J]. SOFT COMPUTING, 2018, 22 (03) : 707 - 714
  • [5] Attribute-Based Encryption With Verifiable Outsourced Decryption
    Lai, Junzuo
    Deng, Robert H.
    Guan, Chaowen
    Weng, Jian
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (08) : 1343 - 1354
  • [6] Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud
    Hou, Zesen
    Ning, Jianting
    Huang, Xinyi
    Xu, Shengmin
    Zhang, Leo Yu
    [J]. COMPUTER STANDARDS & INTERFACES, 2024, 90
  • [7] Attribute-Based Encryption with Publicly Verifiable Outsourced Decryption
    Zheng, Hui
    Shao, Jun
    Wei, Guiyi
    Hue, Li
    Pan, Bianjing
    Liu, Kai
    Mao, Xiaohang
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 552 - 566
  • [8] Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
    Ma, Hui
    Zhang, Rui
    Wan, Zhiguo
    Lu, Yao
    Lin, Suqing
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (06) : 679 - 692
  • [9] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Wang, Hao
    He, Debiao
    Shen, Jian
    Zheng, Zhihua
    Zhao, Chuan
    Zhao, Minghao
    [J]. SOFT COMPUTING, 2017, 21 (24) : 7325 - 7335
  • [10] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Hao Wang
    Debiao He
    Jian Shen
    Zhihua Zheng
    Chuan Zhao
    Minghao Zhao
    [J]. Soft Computing, 2017, 21 : 7325 - 7335