[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Attribute-Based Encryption With Verifiable Outsourced Decryption

Published: 01 August 2013 Publication History

Abstract

Attribute-based encryption (ABE) is a public-key-based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes associated with private keys and ciphertexts. One of the main efficiency drawbacks of the existing ABE schemes is that decryption involves expensive pairing operations and the number of such operations grows with the complexity of the access policy. Recently, Green et. al. proposed an ABE system with outsourced decryption that largely eliminates the decryption overhead for users. In such a system, a user provides an untrusted server, say a cloud service provider, with a transformation key that allows the cloud to translate any ABE ciphertext satisfied by that user's attributes or access policy into a simple ciphertext, and it only incurs a small computational overhead for the user to recover the plaintext from the transformed ciphertext. Security of an ABE system with outsourced decryption ensures that an adversary (including a malicious cloud) will not be able to learn anything about the encrypted message; however, it does not guarantee the correctness of the transformation done by the cloud. In this paper, we consider a new requirement of ABE with outsourced decryption: verifiability. Informally, verifiability guarantees that a user can efficiently check if the transformation is done correctly. We give the formal model of ABE with verifiable outsourced decryption and propose a concrete scheme. We prove that our new scheme is both secure and verifiable, without relying on random oracles. Finally, we show an implementation of our scheme and result of performance measurements, which indicates a significant reduction on computing resources imposed on users.

Cited By

View all
  • (2024)SDAC-BBPP: A Secure Dynamic Access Control Scheme With Blockchain-Based Privacy Protection for IIoTIEEE Transactions on Network and Service Management10.1109/TNSM.2024.337152121:3(3179-3193)Online publication date: 1-Jun-2024
  • (2024)Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health CloudIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.335092519(2732-2745)Online publication date: 1-Jan-2024
  • (2024)Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-Health SystemIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.329212921:4(1845-1862)Online publication date: 1-Jul-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security  Volume 8, Issue 8
August 2013
148 pages

Publisher

IEEE Press

Publication History

Published: 01 August 2013

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)SDAC-BBPP: A Secure Dynamic Access Control Scheme With Blockchain-Based Privacy Protection for IIoTIEEE Transactions on Network and Service Management10.1109/TNSM.2024.337152121:3(3179-3193)Online publication date: 1-Jun-2024
  • (2024)Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health CloudIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.335092519(2732-2745)Online publication date: 1-Jan-2024
  • (2024)Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-Health SystemIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.329212921:4(1845-1862)Online publication date: 1-Jul-2024
  • (2024)Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart ContractIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.326593221:2(937-948)Online publication date: 1-Mar-2024
  • (2024)Blockchain-enabled data sharing for IoTJournal of Systems Architecture: the EUROMICRO Journal10.1016/j.sysarc.2024.103230154:COnline publication date: 18-Oct-2024
  • (2024)Flexible and secure access control for EHR sharing based on blockchainJournal of Systems Architecture: the EUROMICRO Journal10.1016/j.sysarc.2023.103033146:COnline publication date: 14-Mar-2024
  • (2024)Statistical privacy protection for secure data access control in cloudJournal of Information Security and Applications10.1016/j.jisa.2024.10382384:COnline publication date: 1-Aug-2024
  • (2024)ORR-CP-ABEFuture Generation Computer Systems10.1016/j.future.2024.07.040161:C(559-571)Online publication date: 1-Dec-2024
  • (2024)Blockchain-based efficient verifiable outsourced attribute-based encryption in cloudComputer Standards & Interfaces10.1016/j.csi.2024.10385490:COnline publication date: 1-Aug-2024
  • (2024)Lightweight, verifiable and revocable EHRs sharing with fine-grained bilateral access controlCluster Computing10.1007/s10586-024-04464-w27:7(9957-9973)Online publication date: 1-Oct-2024
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media