An IBE Scheme with Verifiable Outsourced Key Generation Based on a Single Server

被引:1
|
作者
Xue, Ting [1 ]
Ren, Yanli [1 ]
Feng, Guorui [1 ]
机构
[1] Shanghai Univ, Sch Commun & Informat Engn, Shanghai 200444, Peoples R China
基金
中国国家自然科学基金;
关键词
Identity-based encryption; Private key generation; Verifiable outsourcing computation; ENCRYPTION;
D O I
10.1080/02564602.2018.1515674
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
It is well known that private key generation is a computing bottleneck in an identity-based encryption scheme when a large number of users exist. Outsourcing computation can greatly reduce the users' computational cost, but the existing schemes are all based on two servers, which are not feasible in the real cloud environment. In this paper, we first propose a scheme where the PKG outsources the task of private key generation to a single server, and the results can be verified effectively. Moreover, PKG only needs to execute 1 modular exponentiation, so it is more efficient when compared with previous schemes. Meanwhile, we prove the indistinguishability of the ciphertext and verifiability of the outsourcing results in the security model. Finally, the proposed algorithm is realized in a simulation environment. Theoretical analysis and experimental results show that total computing time of PKG and the server in the outsourced algorithm is far less than that of direct computation.
引用
收藏
页码:97 / 105
页数:9
相关论文
共 50 条
  • [1] Verifiable Outsourced Attribute Based Encryption Scheme with Fixed Key Size
    Li, Cong
    Wang, Xu An
    Sangaiah, Arun Kumar
    Yang, Haibing
    Shan, Chun
    ADVANCES IN INTERNET, DATA & WEB TECHNOLOGIES, 2018, 17 : 792 - 800
  • [2] Verifiable outsourced attribute-based signature scheme
    Ren, Yanli
    Jiang, Tiejin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18105 - 18115
  • [3] Verifiable outsourced attribute-based signature scheme
    Yanli Ren
    Tiejin Jiang
    Multimedia Tools and Applications, 2018, 77 : 18105 - 18115
  • [4] Comments on "verifiable outsourced attribute-based signature scheme"
    Uzunkol, Osmanbey
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (09) : 11735 - 11742
  • [5] Comments on “verifiable outsourced attribute-based signature scheme”
    Osmanbey Uzunkol
    Multimedia Tools and Applications, 2019, 78 : 11735 - 11742
  • [6] Analysis of an ABE Scheme with Verifiable Outsourced Decryption
    Liao, Yongjian
    He, Yichuan
    Li, Fagen
    Jiang, Shaoquan
    Zhou, Shijie
    SENSORS, 2018, 18 (01):
  • [7] A publicly verifiable anonymous IBE scheme in the standard model
    Li S.-D.
    Yang K.-W.
    Gong L.-M.
    Mao Q.
    Liu X.
    Yang, Kun-Wei (yangkunwei@163.com), 1600, Chinese Institute of Electronics (44): : 673 - 678
  • [8] A Key Management Scheme Based on Outsourced Database
    Shi, Yonghui
    Wang, Kunfu
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND ARTIFICIAL INTELLIGENCE (CAAI 2017), 2017, 134 : 455 - 460
  • [9] QSKCG: Quantum-based secure key communication and key generation scheme for outsourced data in cloud
    Adouth, Vamshi
    Rajagopal, Eswari
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (20):
  • [10] An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption
    Li, Zhidan
    Li, Wenmin
    Jin, Zhengping
    Zhang, Hua
    Wen, Qiaoyan
    IEEE ACCESS, 2019, 7 : 29023 - 29037