Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract

被引:26
|
作者
Ge, Chunpeng [1 ,2 ]
Liu, Zhe [3 ,4 ]
Susilo, Willy [5 ]
Fang, Liming [3 ]
Wang, Hao [5 ]
机构
[1] Shandong Univ, Joint SDU NTU Ctr Artificial Intelligence Res C FA, Jinan 250100, Peoples R China
[2] Shandong Univ, Sch Software, Jinan 250100, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211100, Peoples R China
[4] Zhejiang Lab, Hangzhou 311121, Peoples R China
[5] Univ Wollongong, Inst Cybersecur & Cryptol, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
基金
澳大利亚研究理事会;
关键词
Servers; Attribute-based encryption; reliable outsourced decryption; smart contract;
D O I
10.1109/TDSC.2023.3265932
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Outsourcing the heavy decryption computation to a cloud service provider has been a promising solution for a resource-constrained mobile device to deploy an attribute-based encryption scheme. However, the current attribute based encryption with outsourced decryption schemes only enable the mobile device to verify whether the cloud service provider has returned a correct decryption result, they lack a mechanism to enable the cloud service provider to escape from a mobile device's wrong claim if it has returned a correct decryption result. This article, for the first time, proposes an attribute based encryption with reliable outsourced decryption scheme using the blockchain smart contract. In the proposed scheme, not only can the mobile device verify whether the cloud service provider has returned a correct decryption result, but also the cloud service provider can escape from a wrong claim if the returned decryption result is correct. Moreover, our system achieves the fairness property, which means the cloud service provider can get the reward from the mobile device if and only if it has returned a correct decryption result. Finally, we conduct an implementation to demonstrate that the proposed scheme is practical and efficient.
引用
收藏
页码:937 / 948
页数:12
相关论文
共 50 条
  • [1] Attribute-Based Encryption With Verifiable Outsourced Decryption
    Lai, Junzuo
    Deng, Robert H.
    Guan, Chaowen
    Weng, Jian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (08) : 1343 - 1354
  • [2] Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
    Lin, Suqing
    Zhang, Rui
    Ma, Hui
    Wang, Mingsheng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (10) : 2119 - 2130
  • [3] Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing
    Qin, Baodong
    Zheng, Dong
    IEEE ACCESS, 2019, 7 : 42331 - 42342
  • [4] Fair-and-Exculpable-Attribute-Based Searchable Encryption With Revocation and Verifiable Outsourced Decryption Using Smart Contract
    Chen, Liqing
    Xu, Shiguo
    Zhang, Hao
    Weng, Jian
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (04): : 4302 - 4317
  • [5] Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption
    Zuo, Cong
    Shao, Jun
    Wei, Guiyi
    Xie, Mande
    Ji, Min
    INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 495 - 508
  • [6] Cost-Efficient Outsourced Decryption of Attribute-Based Encryption Schemes for Both Users and Cloud Server in Green Cloud Computing
    Liao, Yongjian
    Zhang, Ganglin
    Chen, Hongjie
    IEEE ACCESS, 2020, 8 : 20862 - 20869
  • [7] Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
    Ma, Hui
    Zhang, Rui
    Wan, Zhiguo
    Lu, Yao
    Lin, Suqing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (06) : 679 - 692
  • [8] Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption
    Mao, Xianping
    Lai, Junzuo
    Mei, Qixiang
    Chen, Kefei
    Weng, Jian
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (05) : 533 - 546
  • [9] A novel chaotic hash-based attribute-based encryption and decryption on cloud computing
    Tamma, Lakshmi Naga Divya
    Ahamad, Shaik Shakeel
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2018, 10 (01) : 1 - 19
  • [10] Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV
    Feng, Chaosheng
    Yu, Keping
    Aloqaily, Moayad
    Alazab, Mamoun
    Lv, Zhihan
    Mumtaz, Shahid
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (11) : 13784 - 13795