An IBE Scheme with Verifiable Outsourced Key Generation Based on a Single Server

被引:1
|
作者
Xue, Ting [1 ]
Ren, Yanli [1 ]
Feng, Guorui [1 ]
机构
[1] Shanghai Univ, Sch Commun & Informat Engn, Shanghai 200444, Peoples R China
基金
中国国家自然科学基金;
关键词
Identity-based encryption; Private key generation; Verifiable outsourcing computation; ENCRYPTION;
D O I
10.1080/02564602.2018.1515674
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
It is well known that private key generation is a computing bottleneck in an identity-based encryption scheme when a large number of users exist. Outsourcing computation can greatly reduce the users' computational cost, but the existing schemes are all based on two servers, which are not feasible in the real cloud environment. In this paper, we first propose a scheme where the PKG outsources the task of private key generation to a single server, and the results can be verified effectively. Moreover, PKG only needs to execute 1 modular exponentiation, so it is more efficient when compared with previous schemes. Meanwhile, we prove the indistinguishability of the ciphertext and verifiability of the outsourcing results in the security model. Finally, the proposed algorithm is realized in a simulation environment. Theoretical analysis and experimental results show that total computing time of PKG and the server in the outsourced algorithm is far less than that of direct computation.
引用
收藏
页码:97 / 105
页数:9
相关论文
共 50 条
  • [21] An Efficient Encryption Scheme with Verifiable Outsourced Decryption in Mobile Cloud Computing
    Li, Jing
    Guan, Zhitao
    Du, Xiaojiang
    Zhang, Zijian
    Wu, Jun
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [22] A key issuing scheme in IBE-based distributed online social networks
    Chen, Yangrong
    Xing, Guanglin
    Journal of Networks, 2013, 8 (10) : 2213 - 2219
  • [23] An IBE scheme using ECC combined public key
    Zhang, Rui
    Liu, Jiqiang
    Han, Zhen
    Zheng, Lijuan
    COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (06) : 1046 - 1054
  • [24] Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing
    Ma, Chao
    Jin, Xiaojun
    Luo, Song
    Wei, Yifei
    Wang, Xiaojun
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2023, 17 (07): : 1935 - 1950
  • [25] Identity-Based Encryption with Verifiable Outsourced Revocation
    Ren, Yanli
    Ding, Ning
    Zhang, Xinpeng
    Lu, Haining
    Gu, Dawu
    COMPUTER JOURNAL, 2016, 59 (11): : 1659 - 1668
  • [26] Attribute-Based Encryption With Verifiable Outsourced Decryption
    Lai, Junzuo
    Deng, Robert H.
    Guan, Chaowen
    Weng, Jian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (08) : 1343 - 1354
  • [27] Verifiable and Searchable Symmetric Encryption Scheme Based on the Public Key Cryptosystem
    Duan, Gangqiang
    Li, Shuai
    ELECTRONICS, 2023, 12 (18)
  • [28] A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
    Fan, Kai
    Wang, Junxiong
    Wang, Xin
    Li, Hui
    Yang, Yintang
    SENSORS, 2017, 17 (07)
  • [29] Verifiable Multikeyword Search Encryption Scheme With Anonymous Key Generation for Medical Internet of Things
    Liu, Xueyan
    Yang, Xiaotao
    Luo, Yukun
    Zhang, Qiang
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (22) : 22315 - 22326
  • [30] A Blockchain-Assisted Verifiable Outsourced Attribute-Based Signcryption Scheme for EHRs Sharing in the Cloud
    Yang, Xiaodong
    Li, Ting
    Xi, Wanting
    Chen, Aijia
    Wang, Caifen
    IEEE ACCESS, 2020, 8 : 170713 - 170731