Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption

被引:107
|
作者
Mao, Xianping [1 ]
Lai, Junzuo [2 ]
Mei, Qixiang [3 ]
Chen, Kefei [4 ]
Weng, Jian [2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Jinan Univ, Dept Comp Sci, Guangzhou 510632, Guangdong, Peoples R China
[3] Guangdong Ocean Univ, Coll Informat, Zhanjiang 524088, Peoples R China
[4] Hangzhou Normal Univ, Sch Sci, Hangzhou 310036, Zhejiang, Peoples R China
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
Attribute-based encryption; outsourced decryption; verifiability; RCCA;
D O I
10.1109/TDSC.2015.2423669
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) provides a mechanism for complex access control over encrypted data. However in most ABE systems, the ciphertext size and the decryption overhead, which grow with the complexity of the access policy, are becoming critical barriers in applications running on resource-limited devices. Outsourcing decryption of ABE ciphertexts to a powerful third party is a reasonable manner to solve this problem. Since the third party is usually believed to be untrusted, the security requirements of ABE with outsourced decryption should include privacy and verifiability. Namely, any adversary including the third party should learn nothing about the encrypted message, and the correctness of the outsourced decryption is supposed to be verified efficiently. We propose generic constructions of CPA-secure and RCCA-secure ABE systems with verifiable outsourced decryption from CPA-secure ABE with outsourced decryption, respectively. We also instantiate our CPA-secure construction in the standard model and then show an implementation of this instantiation. The experimental results show that, compared with the existing scheme, our CPA-secure construction has more compact ciphertext and less computational costs. Moreover, the techniques involved in the RCCA-secure construction can be applied in generally constructing CCA-secure ABE, which we believe to be of independent interest.
引用
收藏
页码:533 / 546
页数:14
相关论文
共 50 条
  • [1] Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption
    Qin, Baodong
    Deng, Robert H.
    Liu, Shengli
    Ma, Siqi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) : 1384 - 1393
  • [2] Attribute-Based Encryption With Verifiable Outsourced Decryption
    Lai, Junzuo
    Deng, Robert H.
    Guan, Chaowen
    Weng, Jian
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (08) : 1343 - 1354
  • [3] Attribute-Based Encryption with Publicly Verifiable Outsourced Decryption
    Zheng, Hui
    Shao, Jun
    Wei, Guiyi
    Hue, Li
    Pan, Bianjing
    Liu, Kai
    Mao, Xiaohang
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 552 - 566
  • [4] Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
    Lin, Suqing
    Zhang, Rui
    Ma, Hui
    Wang, Mingsheng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (10) : 2119 - 2130
  • [5] Offline/online attribute-based encryption with verifiable outsourced decryption
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Huang, Xinyi
    Yiu, S. M.
    Sadakane, Kunihiko
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (07):
  • [6] Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption
    El Gafif, Hassan
    Toumanari, Ahmed
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [7] Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length
    Li, Jiguo
    Sha, Fengjie
    Zhang, Yichen
    Huang, Xinyi
    Shen, Jian
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [8] Efficient Offline/Online Attribute Based Encryption with Verifiable Outsourced Decryption
    Zhao Zhiyuan
    Sun Lei
    Hu Jiafu
    Zhou Shie
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (12) : 2998 - 3006
  • [9] Attribute-based encryption with outsourced decryption in blockchain
    Hui Zheng
    Jun Shao
    Guiyi Wei
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 1643 - 1655
  • [10] Attribute-based encryption with outsourced decryption in blockchain
    Zheng, Hui
    Shao, Jun
    Wei, Guiyi
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (05) : 1643 - 1655