Privacy-Preserving Online/Offline and Outsourced Multi-Authority Attribute-Based Encryption

被引:0
作者
Shao, Jiaye [1 ]
Zhu, Yanqin [1 ]
Ji, Qijin [1 ]
机构
[1] Soochow Univ, Sch Comp Sci & Technol, Suzhou, Peoples R China
来源
2017 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS 2017) | 2017年
基金
中国国家自然科学基金;
关键词
Multi-Authority Attribute-Based Encryption; Online/Offline Encryption; Outsourced Decryption; Policy Privacy; HIDDEN;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute based encryption(ABE) is an efficient technique that exploits attributes and access policies to achieve fine-grained access control in cloud computing. Besides, outspread ABE schemes with multiple authorities(multi-authority ABE) are more suitable for practical applications than basic single-authority ABE schemes. Nevertheless, existing multi-authority ABE schemes either can't preserve access policies' privacy or sustain expensive computational cost of encryption and decryption phases. In this paper, to tackle the above challenges, we propose an online/offline and outsourced multi-authority ABE scheme with policy protection. Roughly speaking, our main idea is to alleviate the online computation overhead for owners by splitting the encryption algorithm to the online encryption and offline encryption. During the decryption phase, users outsource massive decryption operations to the proxy server via the technique of transformation key. We can demonstrate that our scheme is secure and also protects the privacy of access policies according to security analysis. Furthermore, performance analysis shows that our scheme can lighten the computation burden for both owners and users and is quite appropriate for resource-limited devices in the multi-authority systems.
引用
收藏
页码:285 / 291
页数:7
相关论文
共 17 条
  • [1] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [2] Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
  • [3] Goyal V., 2006, P 2006 INT C PRIVACY, P1
  • [4] Green Matthew, 2011, P 20 USENIX SEC S, P523
  • [5] Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Zhou, Jianying
    Au, Man Ho Allen
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) : 665 - 678
  • [6] Hohenberger S, 2014, LECT NOTES COMPUT SC, V8383, P293, DOI 10.1007/978-3-642-54631-0_17
  • [7] Hohenberger S, 2013, LECT NOTES COMPUT SC, V7778, P162, DOI 10.1007/978-3-642-36362-7_11
  • [8] Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid
    Hur, Junbeom
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (11) : 2171 - 2180
  • [9] Kate A, 2007, LECT NOTES COMPUT SC, V4776, P95
  • [10] Lai J., 2012, P 7 ACM S INF COMP C, P18, DOI DOI 10.1145/2414456.2414465