Offline/online attribute-based encryption with verifiable outsourced decryption

被引:14
|
作者
Liu, Zechao [1 ,2 ]
Jiang, Zoe L. [1 ,3 ]
Wang, Xuan [1 ,4 ]
Huang, Xinyi [5 ,6 ]
Yiu, S. M. [7 ]
Sadakane, Kunihiko [8 ]
机构
[1] Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
[2] Shenzhen Appl Technol Engn Lab Internet Multimedi, Shenzhen, Peoples R China
[3] Guangdong Prov Key Lab High Performance Comp, Guangzhou, Guangdong, Peoples R China
[4] Publ Serv Platform Mobile Internet Applicat Secur, Shenzhen 518055, Peoples R China
[5] Fujian Normal Univ, Fuzhou 350108, Peoples R China
[6] Nanjing Univ Informat Sci & Technol, Nanjing 210044, Jiangsu, Peoples R China
[7] Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[8] Univ Tokyo, Sch Informat Sci & Technol, Tokyo, Japan
来源
基金
国家高技术研究发展计划(863计划); 中国国家自然科学基金;
关键词
offline/online ABE; outsourced decryption; verifiable computation; Charm; DELEGATION; SIGNATURE; SECURITY;
D O I
10.1002/cpe.3915
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this big data era, service providers tend to put the data in a third-party cloud system. Social networking websites are typical examples. To protect the security and privacy of the data, data should be stored in encrypted form. This brings forth new challenges: how to allow different users to access only the authorized part of the data without decryption of the data. Attribute-based encryption (ABE) offers fine-grained access control policy over encrypted data such that users can decrypt successfully only if their attributes satisfy the policy. However, one drawback of ABE is that the computational cost grows linearly with the complexity of ciphertext policy or the number of attributes. The situation becomes worse for mobile devices with limited computing resources. To solve this problem, we adopt the offline/online technique combining with the verifiable outsourced computation technique to propose a new ciphertext-policy ABE scheme using bilinear groups in prime order, supporting the offline/online key generation and encryption, as well as the verifiable outsourced decryption. As a result, most computations of key generation and encryption can be executed offline, and the majority of computational workload in decryption can be outsourced to third parties. The scheme is selectively chosen-plaintext attack-secure in the standard model. We also provide the proof of verifiability on outsourced decryption. The simulation results show that our proposed scheme can effectively reduce the computational cost imposed on resource-constrained devices. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
下载
收藏
页数:17
相关论文
共 50 条
  • [21] Searchable Attribute-Based Proxy Re-encryption: Keyword Privacy, Verifiable Expressive Search, and Outsourced Decryption
    Bera S.
    Rao Y.S.
    SN Computer Science, 5 (5)
  • [22] Online/Offline Traceable Attribute-Based Encryption
    Zhang K.
    Ma J.
    Zhang J.
    Ying Z.
    Zhang T.
    Liu X.
    Ma, Jianfeng (jfma@mail.xidian.edu.cn), 2018, Science Press (55): : 216 - 224
  • [23] Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV
    Feng, Chaosheng
    Yu, Keping
    Aloqaily, Moayad
    Alazab, Mamoun
    Lv, Zhihan
    Mumtaz, Shahid
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (11) : 13784 - 13795
  • [24] Outsourced Attribute-Based Encryption Scheme with Policy Updating and Verifiable Ciphertext
    Su, Zelin
    Zhang, Wenfang
    Wang, Xiaomin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (12): : 3088 - 3097
  • [25] Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption
    El Gafif, Hassan
    Toumanari, Ahmed
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [26] Privacy-Preserving Online/Offline and Outsourced Multi-Authority Attribute-Based Encryption
    Shao, Jiaye
    Zhu, Yanqin
    Ji, Qijin
    2017 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS 2017), 2017, : 285 - 291
  • [27] Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud
    Hou, Zesen
    Ning, Jianting
    Huang, Xinyi
    Xu, Shengmin
    Zhang, Leo Yu
    COMPUTER STANDARDS & INTERFACES, 2024, 90
  • [28] Traceable Multiauthority Attribute-Based Encryption with Outsourced Decryption and Hidden Policy for CIoT
    Liu S.
    Yu J.
    Hu C.
    Li M.
    Wireless Communications and Mobile Computing, 2021, 2021
  • [29] Attribute-Based Online/Offline Encryption in Smart Grid
    Wang, Zhiwei
    Chen, Feng
    Xia, Aidong
    24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015, 2015,
  • [30] Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
    Ma, Hui
    Zhang, Rui
    Wan, Zhiguo
    Lu, Yao
    Lin, Suqing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (06) : 679 - 692