Outsourcing Scheme of ABE Encryption Secure against Malicious Adversary

被引:3
|
作者
Ohtake, Go [1 ]
Safavi-Naini, Reihaneh [2 ]
Zhang, Liang Feng [3 ]
机构
[1] NHK Japan Broadcasting Corp, Sci & Technol Res Labs, Tokyo, Japan
[2] Univ Calgary, Dept Comp Sci, Calgary, AB, Canada
[3] ShanghaiTech Univ, Sch Informat Sci & Technol, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
Outsourcing Scheme; Attribute-based Encryption; Malicious Adversary; Random Oracle Model;
D O I
10.5220/0006129600710082
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Integrated broadcast-broadband services allow viewers to simultaneously receive broadcast content over the airwaves and additional information related to the content over the Internet. This integration provides opportunities for new services to be tailored and offered to individual viewers. Viewing histories provide a rich variety of data for service providers to learn the preferences of individual viewers and fine-tune their offerings. Each person's viewing history, however, is privacy-sensitive data and may reveal information that the viewer does not want revealed. In this paper, we propose a system that allows viewers to specify a policy that they would like to be applied to their viewing history, when shared with service providers, by using attribute-based encryption (ABE). A ciphertext is associated with a policy, and it can be decrypted only by service providers who conform to the policy. To reduce the computations of the user terminal, we develop a system with provable security that allows the encryption to be outsourced to a cloud server, without the need to trust the cloud server. Although our solution is described for integrated broadcast-broadband services, the architecture and results could also be used for sharing viewing histories of services such as Netflix. We implemented our scheme and showed that it significantly reduces the computation cost of a user terminal.
引用
收藏
页码:71 / 82
页数:12
相关论文
共 50 条
  • [21] A secure database encryption scheme
    Sesay, S
    Yang, ZK
    Chen, JW
    Xu, D
    [J]. CCNC: 2005 2ND IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2005, : 49 - 53
  • [22] Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model
    Qiong Huang
    Duncan S. Wong
    [J]. Journal of Computer Science and Technology, 2010, 25 : 807 - 826
  • [23] Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model
    Huang, Qiong
    Wong, Duncan S.
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (04) : 807 - 826
  • [24] Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud
    Song, Mingyang
    Sang, Yingpeng
    [J]. SENSORS, 2021, 21 (20)
  • [25] Notes on a provably-secure certificate-based encryption against malicious CA attacks
    Yang, Wenjie
    Weng, Jian
    Yang, Anjia
    Xie, Congge
    Yang, Yaxi
    [J]. INFORMATION SCIENCES, 2018, 463 : 86 - 91
  • [26] Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model
    黄琼
    王石
    [J]. Journal of Computer Science & Technology, 2010, 25 (04) : 807 - 823
  • [27] New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model
    Yang, Wenjie
    Weng, Jian
    Zhang, Futai
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 236 - 247
  • [28] A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation
    Zhang, Ruoqing
    Hui, Lucas
    Yiu, Sm
    Yu, Xiaoqi
    Liu, Zechao
    Jiang, Zoe L.
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 363 - 370
  • [29] An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption
    Li, Zhidan
    Li, Wenmin
    Jin, Zhengping
    Zhang, Hua
    Wen, Qiaoyan
    [J]. IEEE ACCESS, 2019, 7 : 29023 - 29037
  • [30] Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation
    Barbosa, Manuel
    Farshim, Pooya
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2012, 2012, 7178 : 296 - +