Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing

被引:8
|
作者
Zhao, Zhiyuan [1 ]
Wang, Jianhua [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450001, Henan, Peoples R China
关键词
Mobile cloud computing; Ciphertext-policy attribute-based encryption; Access policy; Verifiable; Outsourced computation;
D O I
10.3837/tiis.2017.06.024
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of wireless access technologies and the popularity of mobile intelligent terminals, cloud computing is expected to expand to mobile environments. Attribute-based encryption, widely applied in cloud computing, incurs massive computational cost during the encryption and decryption phases. The computational cost grows with the complexity of the access policy. This disadvantage becomes more serious for mobile devices because they have limited resources. To address this problem, we present an efficient verifiable outsourced scheme based on the bilinear group of prime order. The scheme is called the verifiable outsourced computation ciphertext-policy attribute-based encryption scheme (VOC-CP-ABE), and it provides a way to outsource intensive computing tasks during encryption and decryption phases to CSP without revealing the private information and leaves only marginal computation to the user. At the same time, the outsourced computation can be verified by two hash functions. Then, the formal security proofs of its (selective) CPA security and verifiability are provided. Finally, we discuss the performance of the proposed scheme with comparisons to several related works.
引用
收藏
页码:3254 / 3272
页数:19
相关论文
共 50 条
  • [1] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Wang, Hao
    He, Debiao
    Shen, Jian
    Zheng, Zhihua
    Zhao, Chuan
    Zhao, Minghao
    [J]. SOFT COMPUTING, 2017, 21 (24) : 7325 - 7335
  • [2] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Hao Wang
    Debiao He
    Jian Shen
    Zhihua Zheng
    Chuan Zhao
    Minghao Zhao
    [J]. Soft Computing, 2017, 21 : 7325 - 7335
  • [3] Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud
    Li, Qi
    Zhu, Hongbo
    Ying, Zuobin
    Zhang, Tao
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [4] Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
    Xu, Jie
    Wen, Qiaoyan
    Li, Wenmin
    Jin, Zhengping
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (01) : 119 - 129
  • [5] Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing
    Shi, Yanfeng
    Qiu, Shuo
    [J]. ELECTRONICS, 2021, 10 (21)
  • [6] Comment on "Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption With Verifiable Delegation in Cloud Computing"
    Cao, Zhengjun
    Markowitch, Olivier
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (02) : 392 - 393
  • [7] Outsourced ciphertext-policy attribute-based encryption with partial policy hidden
    Yu, Jinxia
    He, Guanghui
    Yan, Xixi
    Tang, Yongli
    Qin, Rongxia
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (05)
  • [8] Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
    Shijie Deng
    Gaobo Yang
    Wen Dong
    Ming Xia
    [J]. Multimedia Tools and Applications, 2023, 82 : 22251 - 22274
  • [9] Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
    Deng, Shijie
    Yang, Gaobo
    Dong, Wen
    Xia, Ming
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (14) : 22251 - 22274
  • [10] Conditional Ciphertext-Policy Attribute-Based Encryption Scheme in Vehicular Cloud Computing
    Guan, Zhitao
    Li, Jing
    Zhang, Zijian
    Zhu, Liehuang
    [J]. MOBILE INFORMATION SYSTEMS, 2016, 2016