Attribute-based encryption with efficient verifiable outsourced decryption
Attribute-based encryption (ABE) with outsourced decryption not only enables fine-grained sharing of encrypted data, but also overcomes the efficiency drawback (in terms of ciphertext size and decryption cost) of the standard ABE schemes. In particular, an ABE scheme with outsourced decryption allow...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2015
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/2852 https://ink.library.smu.edu.sg/context/sis_research/article/3852/viewcontent/AttributeBasedEncrytionEffVerifiable_2015.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-3852 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-38522017-05-25T03:20:50Z Attribute-based encryption with efficient verifiable outsourced decryption QIN, Baodong DENG, Robert H. LIU, Shengli MA, Siqi Attribute-based encryption (ABE) with outsourced decryption not only enables fine-grained sharing of encrypted data, but also overcomes the efficiency drawback (in terms of ciphertext size and decryption cost) of the standard ABE schemes. In particular, an ABE scheme with outsourced decryption allows a third party (e.g., a cloud server) to transform an ABE ciphertext into a (short) El Gamal-type ciphertext using a public transformation key provided by a user so that the latter can be decrypted much more efficiently than the former by the user. However, a shortcoming of the original outsourced ABE scheme is that the correctness of the cloud server's transformation cannot be verified by the user. That is, an end user could be cheated into accepting a wrong or maliciously transformed output. In this paper, we first formalize a security model of ABE with verifiable outsourced decryption by introducing a verification key in the output of the encryption algorithm. Then, we present an approach to convert any ABE scheme with outsourced decryption into an ABE scheme with verifiable outsourced decryption. The new approach is simple, general, and almost optimal. Compared with the original outsourced ABE, our verifiable outsourced ABE neither increases the user's and the cloud server's computation costs except some nondominant operations (e.g., hash computations), nor expands the ciphertext size except adding a hash value (which is 20 byte for 80-bit security level). We show a concrete construction based on Green et al.'s ciphertext-policy ABE scheme with outsourced decryption, and provide a detailed performance evaluation to demonstrate the advantages of our approach. 2015-07-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/2852 info:doi/10.1109/TIFS.2015.2410137 https://ink.library.smu.edu.sg/context/sis_research/article/3852/viewcontent/AttributeBasedEncrytionEffVerifiable_2015.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Attributed-based encryption data sharing verifiability Computer Sciences Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Attributed-based encryption data sharing verifiability Computer Sciences Information Security |
spellingShingle |
Attributed-based encryption data sharing verifiability Computer Sciences Information Security QIN, Baodong DENG, Robert H. LIU, Shengli MA, Siqi Attribute-based encryption with efficient verifiable outsourced decryption |
description |
Attribute-based encryption (ABE) with outsourced decryption not only enables fine-grained sharing of encrypted data, but also overcomes the efficiency drawback (in terms of ciphertext size and decryption cost) of the standard ABE schemes. In particular, an ABE scheme with outsourced decryption allows a third party (e.g., a cloud server) to transform an ABE ciphertext into a (short) El Gamal-type ciphertext using a public transformation key provided by a user so that the latter can be decrypted much more efficiently than the former by the user. However, a shortcoming of the original outsourced ABE scheme is that the correctness of the cloud server's transformation cannot be verified by the user. That is, an end user could be cheated into accepting a wrong or maliciously transformed output. In this paper, we first formalize a security model of ABE with verifiable outsourced decryption by introducing a verification key in the output of the encryption algorithm. Then, we present an approach to convert any ABE scheme with outsourced decryption into an ABE scheme with verifiable outsourced decryption. The new approach is simple, general, and almost optimal. Compared with the original outsourced ABE, our verifiable outsourced ABE neither increases the user's and the cloud server's computation costs except some nondominant operations (e.g., hash computations), nor expands the ciphertext size except adding a hash value (which is 20 byte for 80-bit security level). We show a concrete construction based on Green et al.'s ciphertext-policy ABE scheme with outsourced decryption, and provide a detailed performance evaluation to demonstrate the advantages of our approach. |
format |
text |
author |
QIN, Baodong DENG, Robert H. LIU, Shengli MA, Siqi |
author_facet |
QIN, Baodong DENG, Robert H. LIU, Shengli MA, Siqi |
author_sort |
QIN, Baodong |
title |
Attribute-based encryption with efficient verifiable outsourced decryption |
title_short |
Attribute-based encryption with efficient verifiable outsourced decryption |
title_full |
Attribute-based encryption with efficient verifiable outsourced decryption |
title_fullStr |
Attribute-based encryption with efficient verifiable outsourced decryption |
title_full_unstemmed |
Attribute-based encryption with efficient verifiable outsourced decryption |
title_sort |
attribute-based encryption with efficient verifiable outsourced decryption |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2015 |
url |
https://ink.library.smu.edu.sg/sis_research/2852 https://ink.library.smu.edu.sg/context/sis_research/article/3852/viewcontent/AttributeBasedEncrytionEffVerifiable_2015.pdf |
_version_ |
1770572641014382592 |