Outsourced Attribute-Based Encryption Scheme with Policy Updating and Verifiable Ciphertext

被引:0
|
作者
Su, Zelin [1 ]
Zhang, Wenfang [1 ]
Wang, Xiaomin [1 ]
机构
[1] School of Information Science and Technology, Southwest Jiaotong University, Chengdu,610756, China
基金
中国国家自然科学基金;
关键词
Access control models - Encryption algorithms;
D O I
10.7544/issn1000-1239.202220133
中图分类号
学科分类号
摘要
Attribute-based encryption is a new access control scheme based on cryptography, which is suitable for data sharing. However, the large computational and communication costs of encryption and access policy updating limit the practical application of attribute-based encryption. Moreover, most of proposed outsourcing ABE schemes do not provide a ciphertext correctness verification method for data owners. Thus, an outsourced ABE scheme with dynamic policy updating and real-time verification of ciphertext correctness is proposed to further protect data privacy in an untrusted cloud environment. In the scheme, the design of policy updating references outsourced encryption, which reduces the computational cost of generating update key. The design of ciphertext correctness verification algorithm refers to decryption operation and introduces verification transformation key to make ciphertext verification more efficient. According to different cloud environment models, efficient verification algorithm and strict verification algorithm are designed, which are suitable for honest but curious cloud environment and untrustworthy cloud environment respectively. The scheme is secure against chosen plaintext attack under the standard model. Performance analysis and efficiency comparison show that the computation of local encryption, policy updating and ciphertext verification are reduced, and the scheme is more lightweight, which is suitable for the application of computation-constrained devices in access control scenarios. © 2024 Science Press. All rights reserved.
引用
收藏
页码:3088 / 3097
相关论文
共 50 条
  • [1] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Wang, Hao
    He, Debiao
    Shen, Jian
    Zheng, Zhihua
    Zhao, Chuan
    Zhao, Minghao
    SOFT COMPUTING, 2017, 21 (24) : 7325 - 7335
  • [2] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Hao Wang
    Debiao He
    Jian Shen
    Zhihua Zheng
    Chuan Zhao
    Minghao Zhao
    Soft Computing, 2017, 21 : 7325 - 7335
  • [3] Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing
    Zhao, Zhiyuan
    Wang, Jianhua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (06): : 3254 - 3272
  • [4] Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length
    Li, Jiguo
    Sha, Fengjie
    Zhang, Yichen
    Huang, Xinyi
    Shen, Jian
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [5] Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud
    Li, Qi
    Zhu, Hongbo
    Ying, Zuobin
    Zhang, Tao
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [6] Attribute-Based Encryption With Verifiable Outsourced Decryption
    Lai, Junzuo
    Deng, Robert H.
    Guan, Chaowen
    Weng, Jian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (08) : 1343 - 1354
  • [7] Outsourced ciphertext-policy attribute-based encryption with partial policy hidden
    Yu, Jinxia
    He, Guanghui
    Yan, Xixi
    Tang, Yongli
    Qin, Rongxia
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (05)
  • [8] Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
    Deng, Shijie
    Yang, Gaobo
    Dong, Wen
    Xia, Ming
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (14) : 22251 - 22274
  • [9] Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
    Shijie Deng
    Gaobo Yang
    Wen Dong
    Ming Xia
    Multimedia Tools and Applications, 2023, 82 : 22251 - 22274
  • [10] Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption
    El Gafif, Hassan
    Toumanari, Ahmed
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021