An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption
Attribute-based encryption (ABE) is a promising cryptographic tool for data owner (DO) to realize fine-grained date sharing in the cloud computing. In the encryption of most existing ABE schemes, a substantial number of modular exponentiations are often required; the computational cost of it is grow...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8598798/ |
id |
doaj-be67512ca38e42a7a867decb5839b739 |
---|---|
record_format |
Article |
spelling |
doaj-be67512ca38e42a7a867decb5839b7392021-03-29T22:59:14ZengIEEEIEEE Access2169-35362019-01-017290232903710.1109/ACCESS.2018.28905658598798An Efficient ABE Scheme With Verifiable Outsourced Encryption and DecryptionZhidan Li0https://orcid.org/0000-0002-5761-3997Wenmin Li1https://orcid.org/0000-0002-1278-1735Zhengping Jin2Hua Zhang3https://orcid.org/0000-0002-0532-9783Qiaoyan Wen4State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, ChinaState Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, ChinaState Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, ChinaState Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, ChinaState Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, ChinaAttribute-based encryption (ABE) is a promising cryptographic tool for data owner (DO) to realize fine-grained date sharing in the cloud computing. In the encryption of most existing ABE schemes, a substantial number of modular exponentiations are often required; the computational cost of it is growing linearly with the complexity of the access policy. Besides, in the most existing ABE with outsourced decryption, the computation cost of generating transformation key is growing linearly with the number of attributes associated with user private key; these computations are prohibitively high for mobile device users, which becomes a bottleneck limiting its application. To address the above issues, we propose a secure outsourcing algorithm for modular exponentiation in one single untrusted server model and a new method to generate the transformation key. Based on these techniques and Brent Waters's ciphertext-policy ABE scheme, we propose an ABE scheme with verifiable outsourced both encryption and decryption, which can securely outsource encryption and decryption to untrusted encryption service provider (ESP) and decryption service provider (DSP), respectively, leaving only a constant number of simple operations for the DO and eligible users to perform locally. In addition, both DO and the eligible users can check the correctness of results returned from the ESP and the DSP with a probability, respectively. Finally, we provide the experimental evaluation and security analysis of our scheme, which indicates that our construction is suitable for the mobile environment.https://ieeexplore.ieee.org/document/8598798/ABEaccess controlsecure outsourcing algorithmmodular exponentiationverifiabilityoutsourced encryption |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Zhidan Li Wenmin Li Zhengping Jin Hua Zhang Qiaoyan Wen |
spellingShingle |
Zhidan Li Wenmin Li Zhengping Jin Hua Zhang Qiaoyan Wen An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption IEEE Access ABE access control secure outsourcing algorithm modular exponentiation verifiability outsourced encryption |
author_facet |
Zhidan Li Wenmin Li Zhengping Jin Hua Zhang Qiaoyan Wen |
author_sort |
Zhidan Li |
title |
An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption |
title_short |
An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption |
title_full |
An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption |
title_fullStr |
An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption |
title_full_unstemmed |
An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption |
title_sort |
efficient abe scheme with verifiable outsourced encryption and decryption |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2019-01-01 |
description |
Attribute-based encryption (ABE) is a promising cryptographic tool for data owner (DO) to realize fine-grained date sharing in the cloud computing. In the encryption of most existing ABE schemes, a substantial number of modular exponentiations are often required; the computational cost of it is growing linearly with the complexity of the access policy. Besides, in the most existing ABE with outsourced decryption, the computation cost of generating transformation key is growing linearly with the number of attributes associated with user private key; these computations are prohibitively high for mobile device users, which becomes a bottleneck limiting its application. To address the above issues, we propose a secure outsourcing algorithm for modular exponentiation in one single untrusted server model and a new method to generate the transformation key. Based on these techniques and Brent Waters's ciphertext-policy ABE scheme, we propose an ABE scheme with verifiable outsourced both encryption and decryption, which can securely outsource encryption and decryption to untrusted encryption service provider (ESP) and decryption service provider (DSP), respectively, leaving only a constant number of simple operations for the DO and eligible users to perform locally. In addition, both DO and the eligible users can check the correctness of results returned from the ESP and the DSP with a probability, respectively. Finally, we provide the experimental evaluation and security analysis of our scheme, which indicates that our construction is suitable for the mobile environment. |
topic |
ABE access control secure outsourcing algorithm modular exponentiation verifiability outsourced encryption |
url |
https://ieeexplore.ieee.org/document/8598798/ |
work_keys_str_mv |
AT zhidanli anefficientabeschemewithverifiableoutsourcedencryptionanddecryption AT wenminli anefficientabeschemewithverifiableoutsourcedencryptionanddecryption AT zhengpingjin anefficientabeschemewithverifiableoutsourcedencryptionanddecryption AT huazhang anefficientabeschemewithverifiableoutsourcedencryptionanddecryption AT qiaoyanwen anefficientabeschemewithverifiableoutsourcedencryptionanddecryption AT zhidanli efficientabeschemewithverifiableoutsourcedencryptionanddecryption AT wenminli efficientabeschemewithverifiableoutsourcedencryptionanddecryption AT zhengpingjin efficientabeschemewithverifiableoutsourcedencryptionanddecryption AT huazhang efficientabeschemewithverifiableoutsourcedencryptionanddecryption AT qiaoyanwen efficientabeschemewithverifiableoutsourcedencryptionanddecryption |
_version_ |
1724190473665380352 |