Efficient Offline/Online Attribute Based Encryption with Verifiable Outsourced Decryption

被引:2
|
作者
Zhao Zhiyuan [1 ]
Sun Lei [1 ]
Hu Jiafu [1 ]
Zhou Shie [1 ]
机构
[1] Informat Engn Univ, Inst 3, Zhengzhou 450001, Henan, Peoples R China
关键词
Attributed-based encryption; Offline/online; Outsourced decryption; Verifiability;
D O I
10.11999/JEIT180122
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Attribute based encryption can provide data confidentiality protection and fine-grained access control for fog-cloud computing, however mobile devices in fog cloud computing system are difficult to bear the burdensome computing burden of attribute based encryption. In order to address this problem, an offline/online ciphertext-plicy attribute-based encryption scheme is presented with verifiable outsourced decryption based on the bilinear group of prime order. It can realize the offline/online key generation and data encryption. Simultaneously, it supports the verifiable outsourced decryption. Then, the formal security proofs of its selective chosen plaintext attack security and verifiability are provided. After that, the improved offline/online ciphertext-plicy attribute-based encryption scheme with verifiable outsourced decryption is presented, which reduces the number of bilinear pairings from linear to constant in the transformation phase. Finally, the efficiency of the proposed scheme is analyzed and verified through theoretical analysis and experimental simulation. The experimental results show that the proposed scheme is efficient and practical.
引用
收藏
页码:2998 / 3006
页数:9
相关论文
共 18 条
  • [1] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [2] Chow S. S. M., 2011, P 6 ACM S INF COMP C, P52, DOI [10.1145/1966913.1966922, DOI 10.1145/1966913.1966922]
  • [3] Even S, 1989, P C THEOR APPL CRYPT, V435, P263, DOI DOI 10.1007/0-387-34805-0_24
  • [4] A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
    Fan, Kai
    Wang, Junxiong
    Wang, Xin
    Li, Hui
    Yang, Yintang
    [J]. SENSORS, 2017, 17 (07)
  • [5] Goyal V., 2006, ACM CCS 2006, P89
  • [6] Green M., 2011, PROC 20 USENIX SECUR
  • [7] Guo FC, 2008, LECT NOTES COMPUT SC, V5143, P247
  • [8] Hohenberger S, 2014, LECT NOTES COMPUT SC, V8383, P293, DOI 10.1007/978-3-642-54631-0_17
  • [9] Fog computing security: a review of current applications and security solutions
    Khan, Saad
    Parkinson, Simon
    Qin, Yongrui
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2017, 6
  • [10] Attribute-Based Encryption With Verifiable Outsourced Decryption
    Lai, Junzuo
    Deng, Robert H.
    Guan, Chaowen
    Weng, Jian
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (08) : 1343 - 1354