Attribute-based encryption with efficient verifiable outsourced decryption

Attribute-based encryption (ABE) with outsourced decryption not only enables fine-grained sharing of encrypted data, but also overcomes the efficiency drawback (in terms of ciphertext size and decryption cost) of the standard ABE schemes. In particular, an ABE scheme with outsourced decryption allow...

Full description

Saved in:
Bibliographic Details
Main Authors: QIN, Baodong, DENG, Robert H., LIU, Shengli, MA, Siqi
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2015
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/2840
https://ink.library.smu.edu.sg/context/sis_research/article/3840/viewcontent/AttributeBasedEncryption_2015_afv.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-3840
record_format dspace
spelling sg-smu-ink.sis_research-38402017-05-25T03:16:11Z Attribute-based encryption with efficient verifiable outsourced decryption QIN, Baodong DENG, Robert H. LIU, Shengli MA, Siqi Attribute-based encryption (ABE) with outsourced decryption not only enables fine-grained sharing of encrypted data, but also overcomes the efficiency drawback (in terms of ciphertext size and decryption cost) of the standard ABE schemes. In particular, an ABE scheme with outsourced decryption allows a third party (e.g., a cloud server) to transform an ABE ciphertext into a (short) El Gamal-type ciphertext using a public transformation key provided by a user so that the latter can be decrypted much more efficiently than the former by the user. However, a shortcoming of the original outsourced ABE scheme is that the correctness of the cloud server's transformation cannot be verified by the user. That is, an end user could be cheated into accepting a wrong or maliciously transformed output. In this paper, we first formalize a security model of ABE with verifiable outsourced decryption by introducing a verification key in the output of the encryption algorithm. Then, we present an approach to convert any ABE scheme with outsourced decryption into an ABE scheme with verifiable outsourced decryption. The new approach is simple, general, and almost optimal. Compared with the original outsourced ABE, our verifiable outsourced ABE neither increases the user's and the cloud server's computation costs except some nondominant operations (e.g., hash computations), nor expands the ciphertext size except adding a hash value (which is 20 byte for 80-bit security level). We show a concrete construction based on Green et al.'s ciphertext-policy ABE scheme with outsourced decryption, and provide a detailed performance evaluation to demonstrate the advantages of our approach. 2015-07-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/2840 info:doi/10.1109/TIFS.2015.2410137 https://ink.library.smu.edu.sg/context/sis_research/article/3840/viewcontent/AttributeBasedEncryption_2015_afv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Attributed-based encryption data sharing verifiability Computer Sciences Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Attributed-based encryption
data sharing
verifiability
Computer Sciences
Information Security
spellingShingle Attributed-based encryption
data sharing
verifiability
Computer Sciences
Information Security
QIN, Baodong
DENG, Robert H.
LIU, Shengli
MA, Siqi
Attribute-based encryption with efficient verifiable outsourced decryption
description Attribute-based encryption (ABE) with outsourced decryption not only enables fine-grained sharing of encrypted data, but also overcomes the efficiency drawback (in terms of ciphertext size and decryption cost) of the standard ABE schemes. In particular, an ABE scheme with outsourced decryption allows a third party (e.g., a cloud server) to transform an ABE ciphertext into a (short) El Gamal-type ciphertext using a public transformation key provided by a user so that the latter can be decrypted much more efficiently than the former by the user. However, a shortcoming of the original outsourced ABE scheme is that the correctness of the cloud server's transformation cannot be verified by the user. That is, an end user could be cheated into accepting a wrong or maliciously transformed output. In this paper, we first formalize a security model of ABE with verifiable outsourced decryption by introducing a verification key in the output of the encryption algorithm. Then, we present an approach to convert any ABE scheme with outsourced decryption into an ABE scheme with verifiable outsourced decryption. The new approach is simple, general, and almost optimal. Compared with the original outsourced ABE, our verifiable outsourced ABE neither increases the user's and the cloud server's computation costs except some nondominant operations (e.g., hash computations), nor expands the ciphertext size except adding a hash value (which is 20 byte for 80-bit security level). We show a concrete construction based on Green et al.'s ciphertext-policy ABE scheme with outsourced decryption, and provide a detailed performance evaluation to demonstrate the advantages of our approach.
format text
author QIN, Baodong
DENG, Robert H.
LIU, Shengli
MA, Siqi
author_facet QIN, Baodong
DENG, Robert H.
LIU, Shengli
MA, Siqi
author_sort QIN, Baodong
title Attribute-based encryption with efficient verifiable outsourced decryption
title_short Attribute-based encryption with efficient verifiable outsourced decryption
title_full Attribute-based encryption with efficient verifiable outsourced decryption
title_fullStr Attribute-based encryption with efficient verifiable outsourced decryption
title_full_unstemmed Attribute-based encryption with efficient verifiable outsourced decryption
title_sort attribute-based encryption with efficient verifiable outsourced decryption
publisher Institutional Knowledge at Singapore Management University
publishDate 2015
url https://ink.library.smu.edu.sg/sis_research/2840
https://ink.library.smu.edu.sg/context/sis_research/article/3840/viewcontent/AttributeBasedEncryption_2015_afv.pdf
_version_ 1770572638840684544