Attribute-based encryption with verifiable outsourced decryption

Attribute-based encryption (ABE) is a public-keybased one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes associate...

Full description

Saved in:
Bibliographic Details
Main Authors: LAI, Junzuo, DENG, Robert H., GUAN, Chaowen, WENG, Jian
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2013
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1940
https://ink.library.smu.edu.sg/context/sis_research/article/2939/viewcontent/AttributeBasedEncrytionVerifiableOutDecryption_2013.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-2939
record_format dspace
spelling sg-smu-ink.sis_research-29392020-04-27T09:05:29Z Attribute-based encryption with verifiable outsourced decryption LAI, Junzuo DENG, Robert H. GUAN, Chaowen WENG, Jian Attribute-based encryption (ABE) is a public-keybased one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes associated with private keys and ciphertexts.One of themain efficiency drawbacks of the existing ABE schemes is that decryption involves expensive pairing operations and the number of such operations grows with the complexity of the access policy. Recently, Green et al. proposed an ABE system with outsourced decryption that largely eliminates the decryption overhead for users. In such a system, a user provides an untrusted server, say a cloud service provider, with a transformation key that allows the cloud to translate any ABE ciphertext satisfied by that user’s attributes or access policy into a simple ciphertext, and it only incurs a small computational overhead for the user to recover the plaintext from the transformed ciphertext. Security of an ABE system with outsourced decryption ensures that an adversary (including a malicious cloud) will not be able to learn anything about the encrypted message; however, it does not guarantee the correctness of the transformation done by the cloud. In this paper, we consider a new requirement of ABE with outsourced decryption: verifiability. Informally, verifiability guarantees that a user can efficiently check if the transformation is done correctly.We give the formal model of ABE with verifiable outsourced decryption and propose a concrete scheme. We prove that our new scheme is both secure and verifiable, without relying on random oracles. Finally, we show an implementation of our scheme and result of performance measurements, which indicates a significant reduction on computing resources imposed on users. 2013-08-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1940 info:doi/10.1109/TIFS.2013.2271848 https://ink.library.smu.edu.sg/context/sis_research/article/2939/viewcontent/AttributeBasedEncrytionVerifiableOutDecryption_2013.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Attribute-based encryption outsourced decryption verifiability Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Attribute-based encryption
outsourced decryption
verifiability
Information Security
spellingShingle Attribute-based encryption
outsourced decryption
verifiability
Information Security
LAI, Junzuo
DENG, Robert H.
GUAN, Chaowen
WENG, Jian
Attribute-based encryption with verifiable outsourced decryption
description Attribute-based encryption (ABE) is a public-keybased one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes associated with private keys and ciphertexts.One of themain efficiency drawbacks of the existing ABE schemes is that decryption involves expensive pairing operations and the number of such operations grows with the complexity of the access policy. Recently, Green et al. proposed an ABE system with outsourced decryption that largely eliminates the decryption overhead for users. In such a system, a user provides an untrusted server, say a cloud service provider, with a transformation key that allows the cloud to translate any ABE ciphertext satisfied by that user’s attributes or access policy into a simple ciphertext, and it only incurs a small computational overhead for the user to recover the plaintext from the transformed ciphertext. Security of an ABE system with outsourced decryption ensures that an adversary (including a malicious cloud) will not be able to learn anything about the encrypted message; however, it does not guarantee the correctness of the transformation done by the cloud. In this paper, we consider a new requirement of ABE with outsourced decryption: verifiability. Informally, verifiability guarantees that a user can efficiently check if the transformation is done correctly.We give the formal model of ABE with verifiable outsourced decryption and propose a concrete scheme. We prove that our new scheme is both secure and verifiable, without relying on random oracles. Finally, we show an implementation of our scheme and result of performance measurements, which indicates a significant reduction on computing resources imposed on users.
format text
author LAI, Junzuo
DENG, Robert H.
GUAN, Chaowen
WENG, Jian
author_facet LAI, Junzuo
DENG, Robert H.
GUAN, Chaowen
WENG, Jian
author_sort LAI, Junzuo
title Attribute-based encryption with verifiable outsourced decryption
title_short Attribute-based encryption with verifiable outsourced decryption
title_full Attribute-based encryption with verifiable outsourced decryption
title_fullStr Attribute-based encryption with verifiable outsourced decryption
title_full_unstemmed Attribute-based encryption with verifiable outsourced decryption
title_sort attribute-based encryption with verifiable outsourced decryption
publisher Institutional Knowledge at Singapore Management University
publishDate 2013
url https://ink.library.smu.edu.sg/sis_research/1940
https://ink.library.smu.edu.sg/context/sis_research/article/2939/viewcontent/AttributeBasedEncrytionVerifiableOutDecryption_2013.pdf
_version_ 1770571692025839616