Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption

作者: Baodong Qin , Robert H Deng , Shengli Liu , Siqi Ma , None

DOI: 10.1109/TIFS.2015.2410137

关键词:

摘要: Attribute-based encryption (ABE) with outsourced decryption not only enables fine-grained sharing of encrypted data, but also overcomes the efficiency drawback (in terms ciphertext size and cost) standard ABE schemes. In particular, an scheme allows a third party (e.g., cloud server) to transform into (short) El Gamal-type using public transformation key provided by user so that latter can be decrypted much more efficiently than former user. However, shortcoming original is correctness server’s cannot verified That is, end could cheated accepting wrong or maliciously transformed output. this paper, we first formalize security model verifiable introducing verification in output algorithm. Then, present approach convert any decryption. The new simple, general, almost optimal. Compared ABE, our neither increases user’s computation costs except some nondominant operations hash computations), nor expands adding value (which et al .’s ciphertext-policy decryption, provide detailed performance evaluation demonstrate advantages approach.

参考文章(20)
Craig Gentry, Shai Halevi, Implementing Gentry's fully-homomorphic encryption scheme international cryptology conference. pp. 129- 148 ,(2011) , 10.1007/978-3-642-20465-4_9
Ran Canetti, Hugo Krawczyk, Jesper B. Nielsen, Relaxing Chosen-Ciphertext Security Advances in Cryptology - CRYPTO 2003. pp. 565- 582 ,(2003) , 10.1007/978-3-540-45146-4_33
Brent Waters, Susan Hohenberger, Matthew Green, Outsourcing the decryption of ABE ciphertexts usenix security symposium. pp. 34- 34 ,(2011)
Amit Sahai, Brent Waters, Fuzzy identity-based encryption theory and application of cryptographic techniques. ,vol. 3494, pp. 457- 473 ,(2005) , 10.1007/11426639_27
Rosario Gennaro, Craig Gentry, Bryan Parno, Non-interactive verifiable computing: outsourcing computation to untrusted workers international cryptology conference. ,vol. 2009, pp. 465- 482 ,(2010) , 10.1007/978-3-642-14623-7_25
Benoît Chevallier-Mames, Jean-Sébastien Coron, Noel McCullagh, David Naccache, Michael Scott, Secure Delegation of Elliptic-Curve Pairing Lecture Notes in Computer Science. ,vol. 6035, pp. 24- 35 ,(2010) , 10.1007/978-3-642-12510-2_3
Junzuo Lai, Robert H Deng, Chaowen Guan, Jian Weng, None, Attribute-Based Encryption With Verifiable Outsourced Decryption IEEE Transactions on Information Forensics and Security. ,vol. 8, pp. 1343- 1354 ,(2013) , 10.1109/TIFS.2013.2271848
Craig Gentry, Fully homomorphic encryption using ideal lattices Proceedings of the 41st annual ACM symposium on Symposium on theory of computing - STOC '09. pp. 169- 178 ,(2009) , 10.1145/1536414.1536440
Nuttapong Attrapadung, Javier Herranz, Fabien Laguillaumie, Benoît Libert, Elie de Panafieu, Carla Ràfols, Attribute-based encryption schemes with constant-size ciphertexts Theoretical Computer Science. ,vol. 422, pp. 15- 38 ,(2012) , 10.1016/J.TCS.2011.12.004