Abstract | ||
---|---|---|
Attribute-Based Encryption (ABE) with outsourced decryption not only enables fine-grained sharing of encrypted data, but also overcomes the efficiency drawback (in terms of ciphertext size and decryption cost) of the standard ABE schemes. Specifically, an ABE scheme with outsourced decryption allows a third party (e.g., a cloud server) to transform an ABE ciphertext into a (short) El Gamal-type ciphertext using a public transformation key provided by a user so that the latter can be decrypted much more efficiently than the former by the user. However, a shortcoming of the original outsourced ABE scheme is that the correctness of the cloud server’s transformation can not be verified by the user. That is, an end user could be cheated into accepting a wrong or maliciously transformed output. In this paper we first formalize a security model of ABE with verifiable outsourced decryption by introducing a verification key in the output of the encryption algorithm. Then, we present an approach to convert any ABE scheme with outsourced deryption into an ABE scheme with verifiable outsourced decryption. The new approach is simple, general and almost optimal. Compared with the original outsourced ABE, our verifiable outsourced ABE neither increases the user’s and the cloud server’s computation costs except some non-dominant operations (e.g., hash computations), nor expands the ciphertext size except adding a hash value (which is less than 20 byte for 80-bit security level). We show a concrete construction based on Green et al.’s ciphertext-policy ABE scheme with outsourced decryption, and provide a detailed performance evaluation to demonstrate the advantages of our approach. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1109/TIFS.2015.2410137 | Information Forensics and Security, IEEE Transactions |
Keywords | Field | DocType |
attributed-based encryption,data sharing,verifiability,encryption,servers,games,security model,public key cryptography,cloud computing | Computer science,Computer security,Attribute-based encryption,Server,Encryption,Theoretical computer science,Verifiable secret sharing,Artificial intelligence,Public-key cryptography,Pattern recognition,Hash function,Ciphertext,Computer security model | Journal |
Volume | Issue | ISSN |
PP | 99 | 1556-6013 |
Citations | PageRank | References |
30 | 0.87 | 16 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Baodong Qin | 1 | 190 | 19.40 |
R.H Deng | 2 | 4423 | 362.82 |
Shengli Liu | 3 | 484 | 45.70 |
Siqi Ma | 4 | 65 | 3.12 |