4.8 Article

Verifiable Outsourced Decryption of Encrypted Data From Heterogeneous Trust Networks

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 9, Issue 22, Pages 22559-22570

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2022.3181684

Keywords

Cloud computing; Servers; Cryptography; Encryption; Costs; Internet of Things; Generators; Cloud computing; encryption; privacy; security

Funding

  1. National Research Foundation of Korea (NRF) - Korea government (MSIT) [2021R1F1A1061420]
  2. National Research Foundation of Korea [2021R1F1A1061420] Funding Source: Korea Institute of Science & Technology Information (KISTI), National Science & Technology Information Service (NTIS)

Ask authors/readers for more resources

This article investigates two state-of-the-art schemes for verifiable outsourced decryption of encrypted data and identifies their vulnerabilities. It then proposes a securitywise enhanced encoding scheme and conducts a rigorous security analysis. Experimental results show that the proposed method outperforms the other two schemes in terms of encoding computation cost.
Cloud-based Internet of Things (IoT) management services can be utilized to acquire data from devices at any point on Earth. Accordingly, controlling access to data managed by possibly untrusted cloud servers is crucial. Attribute-based encryption (ABE) provides flexible access control and the capability to delegate, facilitating decryption operations with high computationally costs to be outsourced to cloud servers. Earlier studies discussed guarantees to the accuracy of delegated computation through various cryptographic encoding techniques, thus helping data receivers verify the precision of outsourced decryption operations. In this article, we investigate two state-of-the-art schemes addressing verifiable outsourced decryption of encrypted data, and show their vulnerability to our verification bypassing attacks. We then propose a securitywise enhanced encoding scheme that disables such attacks. In addition, a rigorous security analysis is conducted, demonstrating the capabilities of the proposed scheme against bypassing attacks. An experimental analysis finds that the method proposed in this article outperforms the two state-of-the-art works by 82% and 87%, respectively, on the encoding computation cost.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available