4.7 Article

Full Verifiability for Outsourced Decryption in Attribute Based Encryption

Journal

IEEE TRANSACTIONS ON SERVICES COMPUTING
Volume 13, Issue 3, Pages 478-487

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TSC.2017.2710190

Keywords

Encryption; Cloud computing; Standards; Access control; Outsourcing; Attribute-based encryption; verifiability; outsourced decryption; CPA-secure

Funding

  1. National Natural Science Foundation of China [61272542, 61672207]
  2. Jiangsu Provincial Natural Science Foundation of China [BK20161511]
  3. Priority Academic Program Development of Jiangsu Higher Education Institutions
  4. Fundamental Research Funds for the Central Universities [2016B10114]
  5. Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, Guangxi Key Laboratory of Cryptography and Information Security [GCIS201605]
  6. Project of Scientific Research Innovation for College Graduate Student of Jiangsu Province [KYZZ15\_0151]

Ask authors/readers for more resources

Attribute based encryption (ABE) is a popular cryptographic technology to protect the security of users data. However, the decryption cost and ciphertext size restrict the application of ABE in practice. For most existing ABE schemes, the decryption cost and ciphertext size grow linearly with the complexity of access structure. This is undesirable to the devices with limited computing capability and storage space. Outsourced decryption is considered as a feasible method to reduce the users decryption overhead, which enables a user to outsource a large number of decryption operations to the cloud service provider (CSP). However, outsourced decryption cannot guarantee the correctness of transformation done by the cloud, so it is necessary to check the correctness of outsourced decryption to ensure security for users data. Current research mainly focuses on verifiability of outsourced decryption for the authorized users. It still remains a challenging issue that how to guarantee the correctness of outsourced decryption for unauthorized users. In this paper, we propose an ABE scheme with verifiable outsourced decryption (called full verifiability for outsourced decryption), which can simultaneously check the correctness for transformed ciphertext for the authorized users and unauthorized users. The proposed ABE scheme with verifiable outsourced decryption is proved to be selective CPA-secure in the standard model.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available