Outsourced attribute-based signatures with perfect privacy for circuits in cloud computing

被引:7
|
作者
Huang, Zhenjie [1 ]
Lin, Zhiwei [1 ]
Chen, Qunshan [2 ]
Zhou, Yuping [2 ]
Huang, Hui [2 ]
机构
[1] Minnan Normal Univ, Fujian Key Lab Granular Comp & Applicat, Zhangzhou 363000, Fujian, Peoples R China
[2] Minnan Normal Univ, Sch Comp Sci, Zhangzhou, Fujian, Peoples R China
来源
关键词
attribute-based signature; circuits; cloud computing; multilinear maps; outsourcing; perfect privacy; INDUSTRIAL-INTERNET; EFFICIENT;
D O I
10.1002/cpe.6173
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Attribute-based signature (ABS) is a widely used cryptographic primitive, that provides both data integrity and fine-grained privacy protection. However, the signing overhead of ABS is usually too large, making it unsuitable for resource-constrained devices. Using cloud computing technology, the notion of outsourced attribute-based signatures (OABS) was introduced to overcome this drawback. In OABS, the user can outsource him/her signing tasks to the signing-cloud service provider (S-CSP). The previous notion of privacy of OABS does not take the S-CSP's attack into account, so it is not strong enough. To conform to the reality of cloud computing, we present a more accurate notion of privacy, called perfect privacy, which ensures that any adversary, even the S-CSP, cannot identify which policy is used to generate the signature. Then, we propose a key-policy OABS scheme for circuits based on multilinear mapping with perfect privacy. By using the outsourcing technique, in our scheme, the computation cost of the signer is only three or four pairing operations, which is independent of the complexity of the policy and the size of the attribute set. Our scheme achieves three advantages: perfect privacy, expressive policy, and constant signing cost, simultaneously.
引用
下载
收藏
页数:13
相关论文
共 50 条
  • [1] OUTSOURCED ATTRIBUTE-BASED SIGNCRYPTION IN THE CLOUD COMPUTING
    Negalign, Hundera W.
    Xiong, Hu
    Addis, Assefa A.
    Ashenafi, Gemechu Y.
    Dagmawit, Geresu M.
    2018 15TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2018, : 40 - 44
  • [2] Secure Outsourced Attribute-Based Signatures with Perfect Anonymity in the Standard Model
    Huang, Zhenjie
    Duan, Runlong
    Chen, Qunshan
    Huang, Hui
    Zhou, Yuping
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021 (2021)
  • [3] Secure Outsourced Attribute-Based Signatures
    Chen, Xiaofeng
    Li, Jin
    Huang, Xinyi
    Li, Jingwei
    Xiang, Yang
    Wong, Duncan S.
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (12) : 3285 - 3294
  • [4] Hierarchical Attribute-based Access Control with Authentication for Outsourced Data in Cloud Computing
    Liu, Xuejiao
    Xia, Yingjie
    Jiang, Shasha
    Xia, Fubiao
    Wang, Yanbo
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 477 - 484
  • [5] Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
    Ning, Jianting
    Cao, Zhenfu
    Dong, Xiaolei
    Liang, Kaitai
    Ma, Hui
    Wei, Lifei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (01) : 94 - 105
  • [6] Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
    Ma, Hui
    Zhang, Rui
    Wan, Zhiguo
    Lu, Yao
    Lin, Suqing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (06) : 679 - 692
  • [7] Efficient Decentralized Attribute-Based Encryption with Outsourced Computation for Mobile Cloud Computing
    Shao, Jiaye
    Zhu, Yanqin
    Ji, Qijin
    2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 417 - 422
  • [8] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Wang, Hao
    He, Debiao
    Shen, Jian
    Zheng, Zhihua
    Zhao, Chuan
    Zhao, Minghao
    SOFT COMPUTING, 2017, 21 (24) : 7325 - 7335
  • [9] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Hao Wang
    Debiao He
    Jian Shen
    Zhihua Zheng
    Chuan Zhao
    Minghao Zhao
    Soft Computing, 2017, 21 : 7325 - 7335
  • [10] An Efficient Revocable Attribute-Based Signcryption Scheme with Outsourced Designcryption in Cloud Computing
    Deng, Ningzhi
    Deng, Shaojiang
    Hu, Chunqiang
    Lei, Kaiwen
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2019, 2019, 11604 : 84 - 97