CP-ABE Scheme with Fast Decryption for Public Cloud

被引:0
|
作者
Zou L.-P. [1 ]
Feng C.-S. [1 ]
Qin Z.-G. [2 ,3 ]
Yuan D. [1 ]
Luo W.-P. [1 ]
Li M. [1 ,3 ]
机构
[1] School of Computer Science, Sichuan Normal University, Chengdu
[2] School of Information & Software Engineering, University of Electronic Science and Technology of China, Chengdu
[3] Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu
来源
Ruan Jian Xue Bao/Journal of Software | 2020年 / 31卷 / 06期
基金
中国国家自然科学基金;
关键词
Access tree; CP-ABE; Decryption outsourcing; Fast decryption; Spark platform;
D O I
10.13328/j.cnki.jos.005704
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Most of existing CP-ABE (ciphertext-policy attribute-based encryption) schemes have such problems as over-computation and a long calculation time in decryption, which make them difficult to be applied and implemented. To solve this problem, the computation outsourcing is introduced into the design of CP-ABE scheme, a Spark-platform-based CP-ABE scheme with fast decryption for public cloud is proposed. In this scheme, the decryption parallelization algorithm is designed based on the decryption feature of CP-ABE, with which, decryption at both leaf node and root node with over-computation is parallelized. Then, the parallelization tasks are handed over to the Spark cluster. The computation outsourcing makes the most decryption computation done by cloud servers, while the user client only needs an exponential operation, and parallelization greatly improves the speed of decryption. Security analysis shows that the proposed scheme can fight against chosen plaintext attack under both the generic group model and the random oracle model. © Copyright 2020, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:1817 / 1828
页数:11
相关论文
共 23 条
  • [11] Waters B., Ciphertext-Policy attribute-based encryption: An expressive, efficient, and provably secure realization, Proc. of the Public Key Cryptography (PKC 2011), pp. 53-70, (2011)
  • [12] Green M, Hohenberger S, Waters B., Outsourcing the decryption of ABE ciphertexts, Proc. of the 20th Usenix Conf. on Security, pp. 34-34, (2011)
  • [13] Li J, Jia C, Li J, Et al., Outsourcing encryption of attribute-based encryption with MapReduce, Proc. of the 14th Int'l Conf. on Information and Communications Security, pp. 191-201, (2012)
  • [14] Zhou Z, Huang D., Efficient and secure data storage operations for mobile cloud computing, Proc. of the 8th Int'l Conf. on Network and Service Management, pp. 37-45, (2012)
  • [15] Lai J, Deng RH, Guan C, Weng J., Attribute-based encryption with verifiable outsourced decryption, IEEE Trans. on Information Forensics and Security, 8, 8, pp. 1343-1354, (2013)
  • [16] Qin B, Deng R, Liu S, Ma S., Attribute-Based encryption with efficient verifiable outsourced decryption, IEEE Trans. on Information Forensics and Security, 10, 7, pp. 1384-1393, (2015)
  • [17] Lin S, Zhang R, Ma H, Wang M., Revisiting attribute-based encryption with verifiable outsourced decryption, IEEE Trans. on Information Forensics & Security, 10, 10, pp. 2119-2130, (2015)
  • [18] Mao X, Lai J, Mei Q, Et al., Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption, IEEE Trans. on Dependable & Secure Computing, 13, 5, pp. 533-546, (2016)
  • [19] Zhang K, Ma J, Liu J, Et al., Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption, Science China Information Sciences, 59, 9, pp. 99-105, (2016)
  • [20] Liu Z, Jiang ZL, Wang X, Et al., Offline/Online attribute-based encryption with verifiable outsourced decryption, Concurrency & Computation Practice & Experience, (2017)