An IBE Scheme with Verifiable Outsourced Key Generation Based on a Single Server

被引:1
|
作者
Xue, Ting [1 ]
Ren, Yanli [1 ]
Feng, Guorui [1 ]
机构
[1] Shanghai Univ, Sch Commun & Informat Engn, Shanghai 200444, Peoples R China
基金
中国国家自然科学基金;
关键词
Identity-based encryption; Private key generation; Verifiable outsourcing computation; ENCRYPTION;
D O I
10.1080/02564602.2018.1515674
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
It is well known that private key generation is a computing bottleneck in an identity-based encryption scheme when a large number of users exist. Outsourcing computation can greatly reduce the users' computational cost, but the existing schemes are all based on two servers, which are not feasible in the real cloud environment. In this paper, we first propose a scheme where the PKG outsources the task of private key generation to a single server, and the results can be verified effectively. Moreover, PKG only needs to execute 1 modular exponentiation, so it is more efficient when compared with previous schemes. Meanwhile, we prove the indistinguishability of the ciphertext and verifiability of the outsourcing results in the security model. Finally, the proposed algorithm is realized in a simulation environment. Theoretical analysis and experimental results show that total computing time of PKG and the server in the outsourced algorithm is far less than that of direct computation.
引用
收藏
页码:97 / 105
页数:9
相关论文
共 50 条
  • [31] Publicly verifiable outsourced data migration scheme supporting efficient integrity checking
    Yang, Changsong
    Zhao, Feng
    Tao, Xiaoling
    Wang, Yong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 192
  • [32] Verifiable Secret Sharing and Distributed Key Generation Based on Hyperplane Geometry
    Yang, Xiaoyun
    Xia, Zhe
    Xiao, Min
    2015 2ND INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING AND INTERNET OF THINGS (DCIT), 2015, : 142 - 145
  • [33] Attribute-Based Encryption with Publicly Verifiable Outsourced Decryption
    Zheng, Hui
    Shao, Jun
    Wei, Guiyi
    Hue, Li
    Pan, Bianjing
    Liu, Kai
    Mao, Xiaohang
    NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 552 - 566
  • [34] On the Privacy of Matrix Masking-Based Verifiable (Outsourced) Computation
    Zhao, Liang
    Chen, Liqun
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (04) : 1296 - 1298
  • [35] A Key Management and Public Auditing Scheme for Outsourced Data
    Wan, Changsheng
    Zhang, Juan
    Zhou, Lin
    Qin, Zhongyuan
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 : 158 - 162
  • [36] Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing
    Li, Guojia
    You, Lin
    Hu, Gengran
    Hu, Liqin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (08): : 2865 - 2878
  • [37] A CP-WABE Scheme Supports Offline/Online Encryption and Verifiable Outsourced Decryption
    Li H.
    Feng C.-S.
    Liu S.-N.
    Liu B.
    Zhao K.-Q.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2020, 48 (11): : 2146 - 2153
  • [38] MD-vcMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication
    Sheng, Gang
    Tang, Chunming
    Gao, Wei
    Yin, Ying
    NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 349 - 362
  • [39] EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy
    Ma, Haobin
    Zhou, Dehua
    Li, Peng
    Wang, Xiaoming
    SENSORS, 2023, 23 (09)
  • [40] Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption
    Qin, Baodong
    Deng, Robert H.
    Liu, Shengli
    Ma, Siqi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) : 1384 - 1393