Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract

被引:26
|
作者
Ge, Chunpeng [1 ,2 ]
Liu, Zhe [3 ,4 ]
Susilo, Willy [5 ]
Fang, Liming [3 ]
Wang, Hao [5 ]
机构
[1] Shandong Univ, Joint SDU NTU Ctr Artificial Intelligence Res C FA, Jinan 250100, Peoples R China
[2] Shandong Univ, Sch Software, Jinan 250100, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211100, Peoples R China
[4] Zhejiang Lab, Hangzhou 311121, Peoples R China
[5] Univ Wollongong, Inst Cybersecur & Cryptol, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
基金
澳大利亚研究理事会;
关键词
Servers; Attribute-based encryption; reliable outsourced decryption; smart contract;
D O I
10.1109/TDSC.2023.3265932
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Outsourcing the heavy decryption computation to a cloud service provider has been a promising solution for a resource-constrained mobile device to deploy an attribute-based encryption scheme. However, the current attribute based encryption with outsourced decryption schemes only enable the mobile device to verify whether the cloud service provider has returned a correct decryption result, they lack a mechanism to enable the cloud service provider to escape from a mobile device's wrong claim if it has returned a correct decryption result. This article, for the first time, proposes an attribute based encryption with reliable outsourced decryption scheme using the blockchain smart contract. In the proposed scheme, not only can the mobile device verify whether the cloud service provider has returned a correct decryption result, but also the cloud service provider can escape from a wrong claim if the returned decryption result is correct. Moreover, our system achieves the fairness property, which means the cloud service provider can get the reward from the mobile device if and only if it has returned a correct decryption result. Finally, we conduct an implementation to demonstrate that the proposed scheme is practical and efficient.
引用
收藏
页码:937 / 948
页数:12
相关论文
共 50 条
  • [31] BSA: Enhancing Attribute-Based Encryption in Cloud Computing with Decentralized Specification
    Li, Peiyao
    Cao, Heyang
    Wang, Mingsheng
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [32] ORR-CP-ABE: A secure and efficient outsourced attribute-based encryption scheme with decryption results reuse
    Tao, Yu
    Zhu, Yi
    Ge, Chunpeng
    Zhou, Lu
    Zhou, Shouchen
    Zhang, Yongjing
    Liu, Jiarong
    Fang, Liming
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 161 : 559 - 571
  • [33] Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing
    Li, Jiguo
    Chen, Ningyu
    Zhang, Yichen
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (02) : 983 - 993
  • [34] A Partial Outsourcing Decryption of Attribute-Based Encryption for Internet of Things
    Kumar, Dilip
    Kumar, Manoj
    PROCEEDINGS OF ACADEMIA-INDUSTRY CONSORTIUM FOR DATA SCIENCE (AICDS 2020), 2022, 1411 : 271 - 281
  • [35] Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Yiu, S. M.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 108 : 112 - 123
  • [36] KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
    Li, Jiguo
    Lin, Xiaonan
    Zhang, Yichen
    Han, Jinguang
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (05) : 715 - 725
  • [37] Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
    Li, Ming
    Yu, Shucheng
    Zheng, Yao
    Ren, Kui
    Lou, Wenjing
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (01) : 131 - 143
  • [38] A secure billing protocol over attribute-based encryption in vehicular cloud computing
    Nkenyereye, Lewis
    Park, Youngho
    Rhee, Kyung Hyune
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [39] Attribute-Based Encryption Scheme With High Efficient Revocation in Cloud Computing Environment
    Chen H.-S.
    Shen Q.-L.
    2018, Beijing University of Posts and Telecommunications (41): : 113 - 118
  • [40] New access control systems based on outsourced attribute-based encryption
    Li, Jin
    Chen, Xiaofeng
    Li, Jingwei
    Jia, Chunfu
    Ma, Jianfeng
    Lou, Wenjing
    JOURNAL OF COMPUTER SECURITY, 2015, 23 (06) : 659 - 683