Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption

被引:170
作者
Qin, Baodong [1 ,2 ,3 ]
Deng, Robert H. [4 ]
Liu, Shengli [1 ]
Ma, Siqi [4 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Singapore Management Univ, Singapore 188065, Singapore
[3] Southwest Univ Sci & Technol, Mianyang 621010, Peoples R China
[4] Singapore Management Univ, Sch Informat Syst, Singapore 188065, Singapore
基金
中国国家自然科学基金;
关键词
Attributed-based encryption; data sharing; decryption outsourcing; verifiability; DELEGATION;
D O I
10.1109/TIFS.2015.2410137
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attribute-based encryption (ABE) with outsourced decryption not only enables fine-grained sharing of encrypted data, but also overcomes the efficiency drawback (in terms of ciphertext size and decryption cost) of the standard ABE schemes. In particular, an ABE scheme with outsourced decryption allows a third party (e.g., a cloud server) to transform an ABE ciphertext into a (short) El Gamal-type ciphertext using a public transformation key provided by a user so that the latter can be decrypted much more efficiently than the former by the user. However, a shortcoming of the original outsourced ABE scheme is that the correctness of the cloud server's transformation cannot be verified by the user. That is, an end user could be cheated into accepting a wrong or maliciously transformed output. In this paper, we first formalize a security model of ABE with verifiable outsourced decryption by introducing a verification key in the output of the encryption algorithm. Then, we present an approach to convert any ABE scheme with outsourced decryption into an ABE scheme with verifiable outsourced decryption. The new approach is simple, general, and almost optimal. Compared with the original outsourced ABE, our verifiable outsourced ABE neither increases the user's and the cloud server's computation costs except some nondominant operations (e.g., hash computations), nor expands the ciphertext size except adding a hash value (which is <20 byte for 80-bit security level). We show a concrete construction based on Green et al.'s ciphertext-policy ABE scheme with outsourced decryption, and provide a detailed performance evaluation to demonstrate the advantages of our approach.
引用
收藏
页码:1384 / 1393
页数:10
相关论文
共 22 条
[1]  
[Anonymous], LIBFENC FUNCTIONAL E
[2]  
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[3]   Attribute-based encryption schemes with constant-size ciphertexts [J].
Attrapadung, Nuttapong ;
Herranz, Javier ;
Laguillaumie, Fabien ;
Libert, Benoit ;
de Panafieu, Elie ;
Rafols, Carla .
THEORETICAL COMPUTER SCIENCE, 2012, 422 :15-38
[4]  
Beimel A., 1996, Secure schemes for secret sharing and key distribution
[5]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[6]  
Canetti R, 2003, LECT NOTES COMPUT SC, V2729, P565
[7]  
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[8]  
Chevallier-Mames B, 2010, LECT NOTES COMPUT SC, V6035, P24, DOI 10.1007/978-3-642-12510-2_3
[9]  
Chung KM, 2010, LECT NOTES COMPUT SC, V6223, P483, DOI 10.1007/978-3-642-14623-7_26
[10]   Fuzzy extractors: How to generate strong keys from biometrics and other noisy data [J].
Dodis, Yevgeniy ;
Ostrovsky, Rafail ;
Reyzin, Leonid ;
Smith, Adam .
SIAM JOURNAL ON COMPUTING, 2008, 38 (01) :97-139