An Expressive "Test-Decrypt-Verify" Attribute-Based Encryption Scheme With Hidden Policy for Smart Medical Cloud

被引:27
作者
Hu, Gongcheng [1 ]
Zhang, Leyou [1 ]
Mu, Yi [2 ]
Gao, Xiaoxu [1 ]
机构
[1] Xidian Univ, Sch Math & Stat, Xian 710126, Peoples R China
[2] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Coll Math & Informat, Fuzhou 350007, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 01期
基金
中国国家自然科学基金;
关键词
Privacy; Encryption; Cloud computing; Access control; Data privacy; Attribute-based encryption (ABE); decryption testing; hidden policy; outsourcing decryption; smart medical; EFFICIENT;
D O I
10.1109/JSYST.2020.2996216
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of cloud computing and the Internet of Things, many companies or individuals store their data in the cloud server, which brings new challenges to the security and privacy. Although traditional encryption schemes could solve some problems, data owners (DOs) might lose the access control over the data, which is important in some specific application scenarios, such as the smart medical cloud system. In order to address these problems, some ciphertext-policy attribute-based encryption (CP-ABE) schemes have been proposed to protect the privacy and security of data; but these schemes still have the following defects: 1) most of the existing hidden policy CP-ABE schemes only enable restricted access structure, such as "AND" gate; 2) several schemes supporting flexible access control are inefficient in decryption, because most of them are constructed in the composite order bilinear group; and 3) many of the proposed schemes fail to check the correctness of decryption message. In this article, we construct a "test-decrypt-verify" CP-ABE scheme based on prime order bilinear group to solve the above-mentioned problems. The proposed scheme supports secure outsourcing decryption, because the return value is an intermediate value unrelated to the encapsulation value of message encrypted by the DO.
引用
收藏
页码:365 / 376
页数:12
相关论文
共 42 条
[1]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[2]   Short group signatures [J].
Boneh, D ;
Boyen, X ;
Shacham, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :41-55
[3]  
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
[4]   An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures [J].
Cui, Hui ;
Deng, Robert H. ;
Wu, Guowei ;
Lai, Junzuo .
PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 :19-38
[5]   Ciphertext-Policy Attribute-Based Signcryption with Verifiable Outsourced Designcryption for Sharing Personal Health Records [J].
Deng, Fuhu ;
Wang, Yali ;
Peng, Li ;
Xiong, Hu ;
Geng, Ji ;
Qin, Zhiguang .
IEEE ACCESS, 2018, 6 :39473-39486
[6]   An Attribute-Based Encryption Scheme Based on Unrecognizable Trapdoors [J].
Du, Ruizhong ;
Tan, Ailun ;
Tian, Junfeng .
TSINGHUA SCIENCE AND TECHNOLOGY, 2020, 25 (05) :579-588
[7]  
Emura K, 2009, LECT NOTES COMPUT SC, V5451, P13, DOI 10.1007/978-3-642-00843-6_2
[8]  
Freeman DM, 2010, LECT NOTES COMPUT SC, V6110, P44
[9]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[10]  
Green M., 2011, PROC USENIX SECUR S, P34