4.7 Article

Securely Outsourcing Attribute-Based Encryption with Checkability

Journal

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TPDS.2013.271

Keywords

Attribute-based encryption; access control; outsourcing computation; key issuing; checkability

Funding

  1. National Natural Science Foundation of China [61100224, 61202450, 61272455]
  2. Natural Science Foundation of Guangdong Province [S2013010013671]
  3. Department of Education, Guangdong Province [Yq2013126]
  4. PhD Programs Foundation of Ministry of Education of China [20123503120001]
  5. Department of Education, Fujian Province [JA13062]
  6. Fok Ying Tung Education Foundation [141065]
  7. Ministry of Education of China [20130203110004]
  8. ISN Research Fund [ISN 15-02, 15-03]
  9. Program for New Century Excellent Talents in University [NCET-13-0946]
  10. China 111 Project [B08038]

Ask authors/readers for more resources

Attribute-Based Encryption (ABE) is a promising cryptographic primitive which significantly enhances the versatility of access control mechanisms. Due to the high expressiveness of ABE policies, the computational complexities of ABE key-issuing and decryption are getting prohibitively high. Despite that the existing Outsourced ABE solutions are able to offload some intensive computing tasks to a third party, the verifiability of results returned from the third party has yet to be addressed. Aiming at tackling the challenge above, we propose a new Secure Outsourced ABE system, which supports both secure outsourced key-issuing and decryption. Our new method offloads all access policy and attribute related operations in the key-issuing process or decryption to a Key Generation Service Provider (KGSP) and a Decryption Service Provider (DSP), respectively, leaving only a constant number of simple operations for the attribute authority and eligible users to perform locally. In addition, for the first time, we propose an outsourced ABE construction which provides checkability of the outsourced computation results in an efficient way. Extensive security and performance analysis show that the proposed schemes are proven secure and practical.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available