4.7 Article

Attribute-Based Encryption With Verifiable Outsourced Decryption

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2013.2271848

Keywords

Attribute-based encryption; outsourced decryption; verifiability

Funding

  1. Office of Research, Singapore Management University
  2. Fundamental Research Funds for the Central Universities
  3. Natural Science Foundation of China [61272534, 61272453]
  4. National Science Foundation of China [61272413, 61005049, 61133014, 61070249, 61272415]
  5. Fok Ying Tung Education Foundation [131066]
  6. Program for New Century Excellent Talents in University [NCET-12-0680]
  7. Shanghai Key Laboratory of Integrate Administration Technologies for Information Security [AGK2011003]
  8. R&D Foundation of Shenzhen Basic Research Project [JC201105170617A]
  9. Guangdong Natural Science Foundation [S2011010001206]
  10. Foundation for Distinguished Young Talents in Higher Education of Guangdong [2012LYM_0027]
  11. A*STAR SERC in Singapore [102 101 0027]

Ask authors/readers for more resources

Attribute-based encryption (ABE) is a public-key-based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes associated with private keys and ciphertexts. One of the main efficiency drawbacks of the existing ABE schemes is that decryption involves expensive pairing operations and the number of such operations grows with the complexity of the access policy. Recently, Green et al. proposed an ABE system with outsourced decryption that largely eliminates the decryption overhead for users. In such a system, a user provides an untrusted server, say a cloud service provider, with a transformation key that allows the cloud to translate any ABE ciphertext satisfied by that user's attributes or access policy into a simple ciphertext, and it only incurs a small computational overhead for the user to recover the plaintext from the transformed ciphertext. Security of an ABE system with outsourced decryption ensures that an adversary (including a malicious cloud) will not be able to learn anything about the encrypted message; however, it does not guarantee the correctness of the transformation done by the cloud. In this paper, we consider a new requirement of ABE with outsourced decryption: verifiability. Informally, verifiability guarantees that a user can efficiently check if the transformation is done correctly. We give the formal model of ABE with verifiable outsourced decryption and propose a concrete scheme. We prove that our new scheme is both secure and verifiable, without relying on random oracles. Finally, we show an implementation of our scheme and result of performance measurements, which indicates a significant reduction on computing resources imposed on users.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available