Outsourced Attribute-Based Encryption Scheme with Policy Updating and Verifiable Ciphertext

被引:0
|
作者
Su, Zelin [1 ]
Zhang, Wenfang [1 ]
Wang, Xiaomin [1 ]
机构
[1] School of Information Science and Technology, Southwest Jiaotong University, Chengdu,610756, China
基金
中国国家自然科学基金;
关键词
Access control models - Encryption algorithms;
D O I
10.7544/issn1000-1239.202220133
中图分类号
学科分类号
摘要
Attribute-based encryption is a new access control scheme based on cryptography, which is suitable for data sharing. However, the large computational and communication costs of encryption and access policy updating limit the practical application of attribute-based encryption. Moreover, most of proposed outsourcing ABE schemes do not provide a ciphertext correctness verification method for data owners. Thus, an outsourced ABE scheme with dynamic policy updating and real-time verification of ciphertext correctness is proposed to further protect data privacy in an untrusted cloud environment. In the scheme, the design of policy updating references outsourced encryption, which reduces the computational cost of generating update key. The design of ciphertext correctness verification algorithm refers to decryption operation and introduces verification transformation key to make ciphertext verification more efficient. According to different cloud environment models, efficient verification algorithm and strict verification algorithm are designed, which are suitable for honest but curious cloud environment and untrustworthy cloud environment respectively. The scheme is secure against chosen plaintext attack under the standard model. Performance analysis and efficiency comparison show that the computation of local encryption, policy updating and ciphertext verification are reduced, and the scheme is more lightweight, which is suitable for the application of computation-constrained devices in access control scenarios. © 2024 Science Press. All rights reserved.
引用
收藏
页码:3088 / 3097
相关论文
共 50 条
  • [21] Comments on “verifiable outsourced attribute-based signature scheme”
    Osmanbey Uzunkol
    Multimedia Tools and Applications, 2019, 78 : 11735 - 11742
  • [22] Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating
    Zuobin YING
    Hui LI
    Jianfeng MA
    Junwei ZHANG
    Jiangtao CUI
    Science China(Information Sciences), 2016, 59 (04) : 187 - 202
  • [23] An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme with Policy Update
    Wang, Changji
    Yuan, Yuan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (02): : 1031 - 1041
  • [24] Improvement of an outsourced attribute-based encryption scheme
    Chen, Hongjie
    Liao, Yongjian
    SOFT COMPUTING, 2019, 23 (22) : 11409 - 11417
  • [25] Ciphertext-policy attribute-based encryption scheme with verifiability on authority
    Yu J.
    He X.
    Yan X.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (04): : 49 - 57
  • [26] Comments on "verifiable outsourced attribute-based signature scheme"
    Uzunkol, Osmanbey
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (09) : 11735 - 11742
  • [27] Comments on "Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation"
    Xiong, Hu
    Wang, Qiang
    Sun, Jianfei
    INFORMATION PROCESSING LETTERS, 2017, 127 : 67 - 70
  • [28] Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme
    Fu, Xingbing
    Nie, Xuyun
    Li, Fagen
    INFORMATION, 2015, 6 (03): : 481 - 493
  • [29] Security analysis for a ciphertext-policy attribute-based encryption scheme
    Zeng, Fugeng
    Xu, Chunxiang
    Zhang, Xinpeng
    Advances in Information Sciences and Service Sciences, 2012, 4 (12): : 201 - 207
  • [30] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +