Offline/online attribute-based encryption with verifiable outsourced decryption

被引:14
|
作者
Liu, Zechao [1 ,2 ]
Jiang, Zoe L. [1 ,3 ]
Wang, Xuan [1 ,4 ]
Huang, Xinyi [5 ,6 ]
Yiu, S. M. [7 ]
Sadakane, Kunihiko [8 ]
机构
[1] Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
[2] Shenzhen Appl Technol Engn Lab Internet Multimedi, Shenzhen, Peoples R China
[3] Guangdong Prov Key Lab High Performance Comp, Guangzhou, Guangdong, Peoples R China
[4] Publ Serv Platform Mobile Internet Applicat Secur, Shenzhen 518055, Peoples R China
[5] Fujian Normal Univ, Fuzhou 350108, Peoples R China
[6] Nanjing Univ Informat Sci & Technol, Nanjing 210044, Jiangsu, Peoples R China
[7] Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[8] Univ Tokyo, Sch Informat Sci & Technol, Tokyo, Japan
来源
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
offline/online ABE; outsourced decryption; verifiable computation; Charm; DELEGATION; SIGNATURE; SECURITY;
D O I
10.1002/cpe.3915
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this big data era, service providers tend to put the data in a third-party cloud system. Social networking websites are typical examples. To protect the security and privacy of the data, data should be stored in encrypted form. This brings forth new challenges: how to allow different users to access only the authorized part of the data without decryption of the data. Attribute-based encryption (ABE) offers fine-grained access control policy over encrypted data such that users can decrypt successfully only if their attributes satisfy the policy. However, one drawback of ABE is that the computational cost grows linearly with the complexity of ciphertext policy or the number of attributes. The situation becomes worse for mobile devices with limited computing resources. To solve this problem, we adopt the offline/online technique combining with the verifiable outsourced computation technique to propose a new ciphertext-policy ABE scheme using bilinear groups in prime order, supporting the offline/online key generation and encryption, as well as the verifiable outsourced decryption. As a result, most computations of key generation and encryption can be executed offline, and the majority of computational workload in decryption can be outsourced to third parties. The scheme is selectively chosen-plaintext attack-secure in the standard model. We also provide the proof of verifiability on outsourced decryption. The simulation results show that our proposed scheme can effectively reduce the computational cost imposed on resource-constrained devices. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Attribute-Based Encryption With Verifiable Outsourced Decryption
    Lai, Junzuo
    Deng, Robert H.
    Guan, Chaowen
    Weng, Jian
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (08) : 1343 - 1354
  • [2] Efficient Offline/Online Attribute Based Encryption with Verifiable Outsourced Decryption
    Zhao Zhiyuan
    Sun Lei
    Hu Jiafu
    Zhou Shie
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (12) : 2998 - 3006
  • [3] Attribute-Based Encryption with Publicly Verifiable Outsourced Decryption
    Zheng, Hui
    Shao, Jun
    Wei, Guiyi
    Hue, Li
    Pan, Bianjing
    Liu, Kai
    Mao, Xiaohang
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 552 - 566
  • [4] Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption
    Qin, Baodong
    Deng, Robert H.
    Liu, Shengli
    Ma, Siqi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) : 1384 - 1393
  • [5] Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
    Lin, Suqing
    Zhang, Rui
    Ma, Hui
    Wang, Mingsheng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (10) : 2119 - 2130
  • [6] Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption
    Mao, Xianping
    Lai, Junzuo
    Mei, Qixiang
    Chen, Kefei
    Weng, Jian
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (05) : 533 - 546
  • [7] Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length
    Li, Jiguo
    Sha, Fengjie
    Zhang, Yichen
    Huang, Xinyi
    Shen, Jian
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [8] Attribute-Based Online/Offline Encryption with Outsourcing Decryption
    Wang, Zhan-Jun
    Ma, Hai-Ying
    Wang, Jin-Hua
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (06) : 1595 - 1611
  • [9] Attribute-based encryption with outsourced decryption in blockchain
    Hui Zheng
    Jun Shao
    Guiyi Wei
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 1643 - 1655
  • [10] Attribute-based encryption with outsourced decryption in blockchain
    Zheng, Hui
    Shao, Jun
    Wei, Guiyi
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (05) : 1643 - 1655