Title
Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption
Abstract
Attribute-Based Encryption (ABE) with outsourced decryption not only enables fine-grained sharing of encrypted data, but also overcomes the efficiency drawback (in terms of ciphertext size and decryption cost) of the standard ABE schemes. Specifically, an ABE scheme with outsourced decryption allows a third party (e.g., a cloud server) to transform an ABE ciphertext into a (short) El Gamal-type ciphertext using a public transformation key provided by a user so that the latter can be decrypted much more efficiently than the former by the user. However, a shortcoming of the original outsourced ABE scheme is that the correctness of the cloud server’s transformation can not be verified by the user. That is, an end user could be cheated into accepting a wrong or maliciously transformed output. In this paper we first formalize a security model of ABE with verifiable outsourced decryption by introducing a verification key in the output of the encryption algorithm. Then, we present an approach to convert any ABE scheme with outsourced deryption into an ABE scheme with verifiable outsourced decryption. The new approach is simple, general and almost optimal. Compared with the original outsourced ABE, our verifiable outsourced ABE neither increases the user’s and the cloud server’s computation costs except some non-dominant operations (e.g., hash computations), nor expands the ciphertext size except adding a hash value (which is less than 20 byte for 80-bit security level). We show a concrete construction based on Green et al.’s ciphertext-policy ABE scheme with outsourced decryption, and provide a detailed performance evaluation to demonstrate the advantages of our approach.
Year
DOI
Venue
2015
10.1109/TIFS.2015.2410137
Information Forensics and Security, IEEE Transactions  
Keywords
Field
DocType
attributed-based encryption,data sharing,verifiability,encryption,servers,games,security model,public key cryptography,cloud computing
Computer science,Computer security,Attribute-based encryption,Server,Encryption,Theoretical computer science,Verifiable secret sharing,Artificial intelligence,Public-key cryptography,Pattern recognition,Hash function,Ciphertext,Computer security model
Journal
Volume
Issue
ISSN
PP
99
1556-6013
Citations 
PageRank 
References 
30
0.87
16
Authors
4
Name
Order
Citations
PageRank
Baodong Qin119019.40
R.H Deng24423362.82
Shengli Liu348445.70
Siqi Ma4653.12