Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain

被引:40
作者
Cui, Hui [1 ,2 ]
Wan, Zhiguo [3 ]
Wei, Xinlei [3 ]
Nepal, Surya [2 ]
Yi, Xun [4 ]
机构
[1] Murdoch Univ, Discipline Informat Technol Math & Stat, Perth, WA 6150, Australia
[2] CSIRO, Data61, Melbourne, Vic 3008, Australia
[3] Shandong Univ, Sch Comp Sci & Technol, Qingdao 266237, Peoples R China
[4] RMIT Univ, Sch Sci, Melbourne, Vic 3001, Australia
基金
中国国家自然科学基金;
关键词
Cloud storage; blockchain; outsourced decryption; ATTRIBUTE-BASED ENCRYPTION; IDENTITY-BASED ENCRYPTION; EFFICIENT;
D O I
10.1109/TIFS.2020.2973864
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The concept of functional encryption (FE) has been introduced to address the shortcomings of public-key encryption (PKE) in many emerging applications which require both data storage and data sharing (e.g., cloud storage service). One of the major issues existing in most FE schemes is the efficiency, as they are built from bilinear pairings of which the computation is very expensive. A widely accepted solution to this problem is outsourcing the heavy workloads to a powerful third party and leaving the user with the light computation. Nevertheless, it is impractical to assume that the third party (e.g., the cloud) will provide free services. To our knowledge, no attention has been paid to the payment procedure between the user and the third party in an FE with outsourced decryption (FEOD) scheme under the assumption that neither of them should be trusted. Leveraging the transactions on cryptocurrencies supported by the blockchain technology, in this paper, we aim to design FE with payable outsourced decryption (FEPOD) schemes. The payment in an FEPOD scheme is achieved through a blockchain-based cryptocurrency, which enables the user to pay a third party when it correctly completes the outsourced decryption. We define the adversarial model for FEPOD schemes, and then present a generic construction of FEPOD schemes. Also, we evaluate the performance of the proposed generic construction by implementing a concrete FEPOD scheme over a blockchain platform.
引用
收藏
页码:3227 / 3238
页数:12
相关论文
共 37 条
[1]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[2]  
Applebaum B, 2010, LECT NOTES COMPUT SC, V6198, P152, DOI 10.1007/978-3-642-14165-2_14
[3]   Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts [J].
Banasik, Waclaw ;
Dziembowski, Stefan ;
Malinowski, Daniel .
COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 :261-280
[4]  
Bentov I, 2014, LECT NOTES COMPUT SC, V8617, P421, DOI 10.1007/978-3-662-44381-1_24
[5]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[6]  
Boneh D, 2011, LECT NOTES COMPUT SC, V6597, P253, DOI 10.1007/978-3-642-19571-6_16
[7]  
Buterin V., Ethereum white paper
[8]  
Camenisch J, 2003, LECT NOTES COMPUT SC, V2729, P126
[9]   Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services [J].
Campanelli, Matteo ;
Gennaro, Rosario ;
Goldfeder, Steven ;
Nizzardo, Luca .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :229-243
[10]  
Chae Hoon Lim, 1995, Advances in Cryptology - EUROCRYPT '95. International Conference on the Theory and Application of Cryptographic Techniques. Proceedings, P64