An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption

Attribute-based encryption (ABE) is a promising cryptographic tool for data owner (DO) to realize fine-grained date sharing in the cloud computing. In the encryption of most existing ABE schemes, a substantial number of modular exponentiations are often required; the computational cost of it is grow...

Full description

Bibliographic Details
Main Authors: Zhidan Li, Wenmin Li, Zhengping Jin, Hua Zhang, Qiaoyan Wen
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
ABE
Online Access:https://ieeexplore.ieee.org/document/8598798/
id doaj-be67512ca38e42a7a867decb5839b739
record_format Article
spelling doaj-be67512ca38e42a7a867decb5839b7392021-03-29T22:59:14ZengIEEEIEEE Access2169-35362019-01-017290232903710.1109/ACCESS.2018.28905658598798An Efficient ABE Scheme With Verifiable Outsourced Encryption and DecryptionZhidan Li0https://orcid.org/0000-0002-5761-3997Wenmin Li1https://orcid.org/0000-0002-1278-1735Zhengping Jin2Hua Zhang3https://orcid.org/0000-0002-0532-9783Qiaoyan Wen4State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, ChinaState Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, ChinaState Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, ChinaState Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, ChinaState Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, ChinaAttribute-based encryption (ABE) is a promising cryptographic tool for data owner (DO) to realize fine-grained date sharing in the cloud computing. In the encryption of most existing ABE schemes, a substantial number of modular exponentiations are often required; the computational cost of it is growing linearly with the complexity of the access policy. Besides, in the most existing ABE with outsourced decryption, the computation cost of generating transformation key is growing linearly with the number of attributes associated with user private key; these computations are prohibitively high for mobile device users, which becomes a bottleneck limiting its application. To address the above issues, we propose a secure outsourcing algorithm for modular exponentiation in one single untrusted server model and a new method to generate the transformation key. Based on these techniques and Brent Waters's ciphertext-policy ABE scheme, we propose an ABE scheme with verifiable outsourced both encryption and decryption, which can securely outsource encryption and decryption to untrusted encryption service provider (ESP) and decryption service provider (DSP), respectively, leaving only a constant number of simple operations for the DO and eligible users to perform locally. In addition, both DO and the eligible users can check the correctness of results returned from the ESP and the DSP with a probability, respectively. Finally, we provide the experimental evaluation and security analysis of our scheme, which indicates that our construction is suitable for the mobile environment.https://ieeexplore.ieee.org/document/8598798/ABEaccess controlsecure outsourcing algorithmmodular exponentiationverifiabilityoutsourced encryption
collection DOAJ
language English
format Article
sources DOAJ
author Zhidan Li
Wenmin Li
Zhengping Jin
Hua Zhang
Qiaoyan Wen
spellingShingle Zhidan Li
Wenmin Li
Zhengping Jin
Hua Zhang
Qiaoyan Wen
An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption
IEEE Access
ABE
access control
secure outsourcing algorithm
modular exponentiation
verifiability
outsourced encryption
author_facet Zhidan Li
Wenmin Li
Zhengping Jin
Hua Zhang
Qiaoyan Wen
author_sort Zhidan Li
title An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption
title_short An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption
title_full An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption
title_fullStr An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption
title_full_unstemmed An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption
title_sort efficient abe scheme with verifiable outsourced encryption and decryption
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2019-01-01
description Attribute-based encryption (ABE) is a promising cryptographic tool for data owner (DO) to realize fine-grained date sharing in the cloud computing. In the encryption of most existing ABE schemes, a substantial number of modular exponentiations are often required; the computational cost of it is growing linearly with the complexity of the access policy. Besides, in the most existing ABE with outsourced decryption, the computation cost of generating transformation key is growing linearly with the number of attributes associated with user private key; these computations are prohibitively high for mobile device users, which becomes a bottleneck limiting its application. To address the above issues, we propose a secure outsourcing algorithm for modular exponentiation in one single untrusted server model and a new method to generate the transformation key. Based on these techniques and Brent Waters's ciphertext-policy ABE scheme, we propose an ABE scheme with verifiable outsourced both encryption and decryption, which can securely outsource encryption and decryption to untrusted encryption service provider (ESP) and decryption service provider (DSP), respectively, leaving only a constant number of simple operations for the DO and eligible users to perform locally. In addition, both DO and the eligible users can check the correctness of results returned from the ESP and the DSP with a probability, respectively. Finally, we provide the experimental evaluation and security analysis of our scheme, which indicates that our construction is suitable for the mobile environment.
topic ABE
access control
secure outsourcing algorithm
modular exponentiation
verifiability
outsourced encryption
url https://ieeexplore.ieee.org/document/8598798/
work_keys_str_mv AT zhidanli anefficientabeschemewithverifiableoutsourcedencryptionanddecryption
AT wenminli anefficientabeschemewithverifiableoutsourcedencryptionanddecryption
AT zhengpingjin anefficientabeschemewithverifiableoutsourcedencryptionanddecryption
AT huazhang anefficientabeschemewithverifiableoutsourcedencryptionanddecryption
AT qiaoyanwen anefficientabeschemewithverifiableoutsourcedencryptionanddecryption
AT zhidanli efficientabeschemewithverifiableoutsourcedencryptionanddecryption
AT wenminli efficientabeschemewithverifiableoutsourcedencryptionanddecryption
AT zhengpingjin efficientabeschemewithverifiableoutsourcedencryptionanddecryption
AT huazhang efficientabeschemewithverifiableoutsourcedencryptionanddecryption
AT qiaoyanwen efficientabeschemewithverifiableoutsourcedencryptionanddecryption
_version_ 1724190473665380352