Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing

被引:0
|
作者
Zhao, Xiaolong [1 ,2 ]
Huang, Zhenjie [1 ,2 ]
机构
[1] Minnan Normal Univ, Fujian Key Lab Granular Comp & Applicat, Zhangzhou 363000, Fujian, Peoples R China
[2] Minnan Normal Univ, Sch Math & Stat, Zhangzhou 363000, Fujian, Peoples R China
基金
中国国家社会科学基金;
关键词
Attribute-based encryption; Cloud data sharing; Fully outsourced; Fully verifiable; Key-policy; ACCESS-CONTROL; SCHEME;
D O I
10.1007/s10586-024-04423-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Verifiable outsourced attribute-based encryption (VO-ABE) enables one-to-many data sharing and fine-grained access control under lower trust, making it suitable for cloud or edge systems involving resource-constrained devices. There is no fully outsourced and fully verifiable attribute-based encryption scheme or key-policy VO-ABE scheme. Moreover, the previous VO-ABE schemes require multiple rounds of interaction or high verification costs to support verifiable outsourced key generation and verifiable outsourced encryption. To address these issues, in this paper, we propose an effective key-policy fully outsourced and fully verifiable attribute-based encryption scheme supporting verifiable outsourced key generation, encryption, and decryption simultaneously. We formally define two new properties: outsourced key generation verifiability and outsourced encryption verifiability. Analysis and simulation show that the proposed scheme performs well and is practical. All local computational overheads of the proposed scheme are constant and do not increase with the number of attributes or the complexity of access structures.
引用
收藏
页码:10437 / 10453
页数:17
相关论文
共 50 条
  • [21] Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length
    Li, Jiguo
    Sha, Fengjie
    Zhang, Yichen
    Huang, Xinyi
    Shen, Jian
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [22] Fine-grained access control system based on fully outsourced attribute-based encryption
    Zhang, Rui
    Ma, Hui
    Lu, Yao
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2017, 125 : 344 - 353
  • [23] Verifiable and hybrid attribute-based proxy re-encryption for flexible data sharing in cloud storage
    Sun, Lixue
    Xu, Chunxiang
    Zeng, Fugeng
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2024, 193
  • [24] A Blockchain-Assisted Verifiable Outsourced Attribute-Based Signcryption Scheme for EHRs Sharing in the Cloud
    Yang, Xiaodong
    Li, Ting
    Xi, Wanting
    Chen, Aijia
    Wang, Caifen
    [J]. IEEE ACCESS, 2020, 8 : 170713 - 170731
  • [25] Fully secure revocable attribute-based encryption
    Qian J.-L.
    Dong X.-L.
    [J]. Journal of Shanghai Jiaotong University (Science), 2011, 16 (4) : 490 - 496
  • [26] Fully secure attribute-based broadcast encryption
    [J]. Sun, J. (oksunjin@xaut.edu.cn), 2012, Science Press (39):
  • [27] Fully Secure Revocable Attribute-Based Encryption
    钱俊磊
    董晓蕾
    [J]. Journal of Shanghai Jiaotong University(Science), 2011, 16 (04) : 490 - 496
  • [28] Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing
    Ma, Chao
    Jin, Xiaojun
    Luo, Song
    Wei, Yifei
    Wang, Xiaojun
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2023, 17 (07): : 1935 - 1950
  • [29] Verifiable outsourced attribute-based signature scheme
    Yanli Ren
    Tiejin Jiang
    [J]. Multimedia Tools and Applications, 2018, 77 : 18105 - 18115
  • [30] Verifiable outsourced attribute-based signature scheme
    Ren, Yanli
    Jiang, Tiejin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18105 - 18115