An Encryption and Decryption Outsourcing CP-ABE scheme Supporting Efficient Ciphertext Evolution

被引:4
|
作者
Yan, Xincheng [1 ]
Chen, Yue [1 ]
Zhai, Yuchang [2 ]
Ba, Yang [1 ]
Li, XueWei [1 ]
Jia, Hongyong [3 ]
机构
[1] PLA Strateg Support Force Informat Engn Univ, Zhengzhou, Henan, Peoples R China
[2] Hong Kong Baptist Univ, Kowloon Tong, Hong Kong, Peoples R China
[3] Zhengzhou Univ, Zhengzhou, Henan, Peoples R China
关键词
Cloud storage; Encryption and decryption outsourcing; Attribute-based encryption; Ciphertext evolution; Attribute revocation; REVOCATION;
D O I
10.1145/3377644.3377669
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) provides fine-grained access control policy for encrypted data in semi-trusted cloud storage system, while encryption and decryption are quite expensive for users with resource constrained devices. Besides, key compromise also brings great security risks to the stored ciphertext for its long-term immutability. On one hand, ABE with decryption outsourcing is preferred to relieve user's computation cost, but the computational overhead of encryption for users also needs to be taken into account. On the other, the stored ciphertext needs to be updated periodically with a new method instead of data re-encryption with heavy computation and communication overhead. Therefore, a novel ciphertext-policy attribute-based encryption scheme supporting efficient periodic ciphertext evolution with encryption and decryption outsourcing (EDO-CE-CPABE) was proposed which can solve the aforementioned issues. It can ensure that the ciphertext and the key are transformed synchronously. As a result, legitimate users can always access data, while the key and the ciphertext are changing periodically from the view of an attacker. Security and performance analysis demonstrate the security, effectiveness and practicability of the proposed scheme, which also illustrates that periodic ciphertext evolution can reduce the probability for successful attacks and attribute revocation is supported to change user's access rights timely and effectively. Also, computation cost for users can be effectively reduced by encryption and decryption outsourcing.
引用
收藏
页码:116 / 125
页数:10
相关论文
共 50 条
  • [1] Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT
    Abdollahi, Sina
    Mohajeri, Javad
    Salmasizadeh, Mahmoud
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 15 (01): : 97 - 110
  • [2] Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage
    Chen, Ningyu
    Li, Jiguo
    Zhang, Yichen
    Guo, Yuyan
    IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (01) : 175 - 184
  • [3] A BGN Type Outsourcing the Decryption of CP-ABE Ciphertexts
    Li Zhenlin
    Zhang Wei
    Ding Yitao
    Bai Ping
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 54 - 63
  • [4] CP-ABE Scheme with Fast Decryption for Public Cloud
    Zou L.-P.
    Feng C.-S.
    Qin Z.-G.
    Yuan D.
    Luo W.-P.
    Li M.
    Ruan Jian Xue Bao/Journal of Software, 2020, 31 (06): : 1817 - 1828
  • [5] A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation
    Zhang, Ruoqing
    Hui, Lucas
    Yiu, Sm
    Yu, Xiaoqi
    Liu, Zechao
    Jiang, Zoe L.
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 363 - 370
  • [6] OE-CP-ABE: Over-Encryption Based CP-ABE Scheme for Efficient Policy Updating
    Hao, Jialu
    Liu, Jian
    Rong, Hong
    Wang, Huimei
    Xian, Ming
    NETWORK AND SYSTEM SECURITY, 2017, 10394 : 499 - 509
  • [7] Requester-Centric CP-ABE Combining Removing Escrow and Outsourcing Decryption
    Yao, Wang
    Wu, Faguo
    Zhang, Xiao
    CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 192 - 204
  • [8] A SEARCHABLE ENCRYPTION OF CP-ABE SCHEME IN CLOUD STORAGE
    Xiong, An-Ping
    Gan, Qi-Xian
    He, Xin-Xin
    Zhao, Quan
    2013 10TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2013, : 345 - 349
  • [9] A CP-ABE Scheme Supporting Arithmetic Span Programs
    Ma, Chao
    Gao, Haiying
    Wei, Duo
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [10] Verifying Outsourced Decryption of CP-ABE with Signature
    Liu, Hongwei
    Wang, Xueyuan
    Zhang, Peng
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 2010 - 2016