CP-ABE Scheme with Fast Decryption for Public Cloud

被引:0
|
作者
Zou L.-P. [1 ]
Feng C.-S. [1 ]
Qin Z.-G. [2 ,3 ]
Yuan D. [1 ]
Luo W.-P. [1 ]
Li M. [1 ,3 ]
机构
[1] School of Computer Science, Sichuan Normal University, Chengdu
[2] School of Information & Software Engineering, University of Electronic Science and Technology of China, Chengdu
[3] Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu
来源
Ruan Jian Xue Bao/Journal of Software | 2020年 / 31卷 / 06期
基金
中国国家自然科学基金;
关键词
Access tree; CP-ABE; Decryption outsourcing; Fast decryption; Spark platform;
D O I
10.13328/j.cnki.jos.005704
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Most of existing CP-ABE (ciphertext-policy attribute-based encryption) schemes have such problems as over-computation and a long calculation time in decryption, which make them difficult to be applied and implemented. To solve this problem, the computation outsourcing is introduced into the design of CP-ABE scheme, a Spark-platform-based CP-ABE scheme with fast decryption for public cloud is proposed. In this scheme, the decryption parallelization algorithm is designed based on the decryption feature of CP-ABE, with which, decryption at both leaf node and root node with over-computation is parallelized. Then, the parallelization tasks are handed over to the Spark cluster. The computation outsourcing makes the most decryption computation done by cloud servers, while the user client only needs an exponential operation, and parallelization greatly improves the speed of decryption. Security analysis shows that the proposed scheme can fight against chosen plaintext attack under both the generic group model and the random oracle model. © Copyright 2020, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:1817 / 1828
页数:11
相关论文
共 23 条
  • [1] Feng CS, Qin ZG, Ding Y, Yu Q., Key techniques of access control for cloud computing, Acta Electronica Sinica, 43, 2, pp. 312-319, (2015)
  • [2] Feng DG, Zhang M, Zhang Y, Xu Z., Study on cloud computing security, Ruan Jian Xue Bao/Journal of Software, 22, 1, pp. 71-83, (2011)
  • [3] Feng CS, Qin ZG, Yuan D., Techniques of secure storage for cloud data, Chinese Journal of Computers, 38, 1, pp. 150-163, (2015)
  • [4] Sahai A, Waters B., Fuzzy identity based encryption, Proc. of the Advances in Cryptology, Eurocrypt. LNCS, pp. 457-473, (2005)
  • [5] Bethencourt J, Sahai A, Waters B., Ciphertext-Policy attribute-based encryption, Proc. of the 2007 IEEE Symp. on Security and Privacy, pp. 321-334, (2007)
  • [6] Goyal V, Pandey A, Sahai A, Waters B., Attribute-Based encryption for fine-grained access control of encrypted data, Proc. of the 13th ACM Conf. on Computer and Communications Security (CCS 2006), pp. 89-98, (2006)
  • [7] Ostrovsky R, Sahai A, Waters B., Attribute-Based encryption with non-monotonic access structures, Proc. of the 14th ACM Conf. on Computer and Communications Security, pp. 1-17, (2007)
  • [8] Cheung L, Newport C., Provably secure ciphertext policy ABE, Proc. of the 14th ACM Conf. on Computer and Communications Security, pp. 456-465, (2007)
  • [9] Goyal V, Jain A, Pandey O, Sahai A., Bounded ciphertext policy attribute based encryption, Proc. of the 35th Int'l Colloquium on Automata, Languages and Programming, pp. 579-591, (2008)
  • [10] Li J, Ren K, Zhu B, Wan Z., Privacy-Aware attribute-based encryption with user accountability, Proc. of the Int'l Conf. on Information Security, pp. 347-362, (2009)