DOI QR코드

DOI QR Code

Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing

  • Zhao, Zhiyuan (Zhengzhou Information Science and Technology Institute) ;
  • Wang, Jianhua (Zhengzhou Information Science and Technology Institute)
  • Received : 2016.11.24
  • Accepted : 2017.03.30
  • Published : 2017.06.30

Abstract

With the development of wireless access technologies and the popularity of mobile intelligent terminals, cloud computing is expected to expand to mobile environments. Attribute-based encryption, widely applied in cloud computing, incurs massive computational cost during the encryption and decryption phases. The computational cost grows with the complexity of the access policy. This disadvantage becomes more serious for mobile devices because they have limited resources. To address this problem, we present an efficient verifiable outsourced scheme based on the bilinear group of prime order. The scheme is called the verifiable outsourced computation ciphertext-policy attribute-based encryption scheme (VOC-CP-ABE), and it provides a way to outsource intensive computing tasks during encryption and decryption phases to CSP without revealing the private information and leaves only marginal computation to the user. At the same time, the outsourced computation can be verified by two hash functions. Then, the formal security proofs of its (selective) CPA security and verifiability are provided. Finally, we discuss the performance of the proposed scheme with comparisons to several related works.

Keywords

Acknowledgement

Supported by : National key Research Program of China

References

  1. R. Buyya, C. S. Yeo, S. Venugopal and et al, "Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility," Future Generation computer systems, vol. 25, no. 6, pp. 599-616, June, 2009. https://doi.org/10.1016/j.future.2008.12.001
  2. A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Proc. of Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457-473, May 22-26, 2005.
  3. V. Goyal, O. Pandey, A. Sahai and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. of the 13th ACM conference on Computer and communications security, pp. 89-98, October 30-November 3, 2006.
  4. J. Bethencourt, A. Sahai and B. Waters, "Ciphertext-policy attribute-based encryption," in Proc. of IEEE symposium on security and privacy, pp. 321-334, May 20-23, 2007.
  5. Y. Rouselakis and B. Waters, "Practical constructions and new proof methods for large universe attribute-based encryption," in Proc. of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 463-474, November 4-8, 2013.
  6. K. Emura, A. Miyaji, A. Nomura and et al, "A ciphertext-policy attribute-based encryption scheme with constant ciphertext length," in Proc. of International Conference on Information Security Practice and Experience, pp. 13-23, April 13-15, 2009.
  7. A. Lewko, T. Okamoto, A. Sahai and et al, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption," in Proc. of Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 62-91, May 30-June 3, 2010.
  8. Y. Fang, Z. Wen, Q. Shen and et al, "POSTER: Ciphertext-policy attribute-based encryption method with secure decryption key generation and outsourcing decryption of ABE ciphertexts," in Proc. of International Conference on Security and Privacy in Communication Systems, pp. 585-589, October 26-29, 2015.
  9. K. Zhang, J. Ma, J. Liu and H. Li, "Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption," Science China Information Sciences, vol. 59, no. 9, pp. 99-105, September, 2016.
  10. H. Wang, D. He, J. Shen and et al, "Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing," Soft Computing, pp. 1-11, July, 2016.
  11. M. Green, S. Hohenberger and B. Waters, "Outsourcing the decryption of ABE ciphertexts," in Proc. of USENIX Security Symposium, pp.34-34, August 8-12, 2011.
  12. D. Benjamin and M. J. Atallah, "Private and cheating-free outsourcing of algebraic computations," in Proc. of Sixth Annual Conference on Privacy, Security and Trust, pp. 240-245, October 1-3, 2008.
  13. J. Li, C. Jia, J. Li and X. Chen, "Outsourcing encryption of attribute-based encryption with mapreduce," in Proc. of International Conference on Information and Communications Security, pp. 191-201, Otober 29-31, 2012.
  14. J. Li, X. Chen, J. Li and et al, "Fine-grained access control system based on outsourced attribute-based encryption," in Proc. of European Symposium on Research in Computer Security, pp. 592-609, September 9-13, 2013.
  15. Z. Zhou and D. Huang, "Efficient and secure data storage operations for mobile cloud computing," in Proc. of the 8th International Conference on Network and Service Management, pp. 37-45, October 22-26, 2012.
  16. J. Li, X. Huang, J. Li and et al, "Securely outsourcing attribute-based encryption with checkability," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 8, pp. 2201-2210, August, 2014. https://doi.org/10.1109/TPDS.2013.271
  17. F. Armknecht, J. M. Bohli, G. O. Karame and et al, "Outsourced proofs of retrievability," in Proc. of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 831-843, November 3-7, 2014.
  18. J. Lai, R. H. Deng, C. Guan and J. Wang, "Attribute-based encryption with verifiable outsourced decryption," IEEE Transactions on information forensics and security, vol. 8, no. 8, pp. 1343-1354, August, 2013. https://doi.org/10.1109/TIFS.2013.2271848
  19. J. Li, F. Sha, Y. Zhang and et al, "Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length," Security and Communication Networks, vol. 2017, no. 2017, January, 2017.
  20. Q. Chai and G. Gong, "Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers," in Proc. of IEEE International Conference on Communications, pp. 917-922, June 10-15, 2012.
  21. L. Trevisan and S. Vadhan, "Extracting randomness from samplable distributions," in Proc. of 41st Annual Symposium on Foundations of Computer Science, pp. 32-42, November 12-14, 2000.
  22. Y. Dodis, R. Ostrovsky, L. Reyzin and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM journal on computing, vol. 38, no. 1, pp. 97- 139, March, 2008. https://doi.org/10.1137/060651380
  23. B. Lynn, The pairing-based cryptography (PBC) library[OL]. http://crypto.stanford.edu/pbc. 2006.