Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 5/2020

08.06.2020

Attribute-based encryption with outsourced decryption in blockchain

verfasst von: Hui Zheng, Jun Shao, Guiyi Wei

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 5/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Attribute-based encryption (ABE) is a powerful cryptographic primitive for access control and fine-grained sharing on encrypted data. Due to this functionality, ABE is usually adopted in encrypted cloud storage for flexible data sharing. However, the main drawback of ABE is that the computational cost grows linearly with the complexity of the access policy. One of the promising solutions for the problem is to outsource computation securely. For example, the user can outsource most of the decryption cost to a proxy, while the underlying plaintext remains confidential. Nonetheless, all the existing ABE schemes with outsourced decryption ignore the fairness between the user and the proxy, i.e., the user may refuse to pay even if he/she obtain the valid result. To address this problem, in this paper we propose a new ABE scheme with fair outsourced decryption by using blockchain and sampling technique. In particular, we make use of the smart contract in blockchain to guarantee that the proxy can always get the reward with the valid outsourced decryption result. Furthermore, we apply the sampling technique to enable the miners in blockchain to check the validity of the outsourced decryption result. The detailed analysis conducts that our proposal is secure and fair under some reasonable assumptions, and the experimental results demonstrate that our proposal is efficient. At last, it may be of independent interest that our proposal is a generic construction for pairing-based ABE schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Beimel A (1996) Secure schemes for secret sharing and key distribution Beimel A (1996) Secure schemes for secret sharing and key distribution
2.
3.
Zurück zum Zitat Campanelli M, Gennaro R, Goldfeder S, Nizzardo L (2017) Zero-knowledge contingent payments revisited: Attacks and payments for services. In: ACM CCS, pp 229–243 Campanelli M, Gennaro R, Goldfeder S, Nizzardo L (2017) Zero-knowledge contingent payments revisited: Attacks and payments for services. In: ACM CCS, pp 229–243
4.
Zurück zum Zitat Canetti R, Riva B, Rothblum GN (2011) Practical delegation of computation using multiple servers. In: ACM CCS, pp 445–454 Canetti R, Riva B, Rothblum GN (2011) Practical delegation of computation using multiple servers. In: ACM CCS, pp 445–454
5.
Zurück zum Zitat Canetti R, Riva B, Rothblum GN (2012) Two protocols for delegation of computation. In: Information theoretic security - 6th international conference, ICITS, pp 37–61 Canetti R, Riva B, Rothblum GN (2012) Two protocols for delegation of computation. In: Information theoretic security - 6th international conference, ICITS, pp 37–61
7.
Zurück zum Zitat Dong C, Wang Y, Aldweesh A, McCorry P, van Moorsel A (2017) Betrayal, distrust, and rationality: smart counter-collusion contracts for verifiable cloud computing. In: ACM CCS, pp 211–227 Dong C, Wang Y, Aldweesh A, McCorry P, van Moorsel A (2017) Betrayal, distrust, and rationality: smart counter-collusion contracts for verifiable cloud computing. In: ACM CCS, pp 211–227
8.
Zurück zum Zitat Feige U, Kilian J (1997) Making games short (extended abstract). In: ACM STOC, pp 506–516 Feige U, Kilian J (1997) Making games short (extended abstract). In: ACM STOC, pp 506–516
9.
Zurück zum Zitat Gokuldev S, Leelavathi S (2013) Hasbe: a hierarchical attribute-based solution for flexible and scalable access control by separate encryption/decryption in cloud computing. International Journal of Engineering Science and Innovative Technology (IJESIT) 2(3) Gokuldev S, Leelavathi S (2013) Hasbe: a hierarchical attribute-based solution for flexible and scalable access control by separate encryption/decryption in cloud computing. International Journal of Engineering Science and Innovative Technology (IJESIT) 2(3)
10.
Zurück zum Zitat Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: ACM CCS, pp 89–98 Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: ACM CCS, pp 89–98
11.
Zurück zum Zitat Green M, Hohenberger S, Waters B, et al. (2011) Outsourcing the decryption of abe ciphertexts. In: USENIX Security symposium, vol 2011 Green M, Hohenberger S, Waters B, et al. (2011) Outsourcing the decryption of abe ciphertexts. In: USENIX Security symposium, vol 2011
12.
Zurück zum Zitat Guo F, Mu Y, Susilo W, Wong DS, Varadharajan V (2014) Cp-abe with constant-size keys for lightweight devices. IEEE Trans Inform Forens Secur 9(5):763–771CrossRef Guo F, Mu Y, Susilo W, Wong DS, Varadharajan V (2014) Cp-abe with constant-size keys for lightweight devices. IEEE Trans Inform Forens Secur 9(5):763–771CrossRef
13.
Zurück zum Zitat Hu S, Cai C, Wang Q, Wang C, Luo X, Ren K (2018) Searching an encrypted cloud meets blockchain: a decentralized, reliable and fair realization. In: IEEE INFOCOM, pp 792–800 Hu S, Cai C, Wang Q, Wang C, Luo X, Ren K (2018) Searching an encrypted cloud meets blockchain: a decentralized, reliable and fair realization. In: IEEE INFOCOM, pp 792–800
14.
Zurück zum Zitat Huang H, Chen X, Wu Q, Huang X, Shen J (2018) Bitcoin-based fair payments for outsourcing computations of fog devices. Future Generation Comp. Syst. 78:850–858CrossRef Huang H, Chen X, Wu Q, Huang X, Shen J (2018) Bitcoin-based fair payments for outsourcing computations of fog devices. Future Generation Comp. Syst. 78:850–858CrossRef
15.
Zurück zum Zitat Koppula V, Waters B (2019) Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption. In: CRYPTO, pp 671–700 Koppula V, Waters B (2019) Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption. In: CRYPTO, pp 671–700
16.
17.
Zurück zum Zitat Kumaresan R, Bentov I (2014) How to use bitcoin to incentivize correct computations. In: ACM CCS, pp 30–41 Kumaresan R, Bentov I (2014) How to use bitcoin to incentivize correct computations. In: ACM CCS, pp 30–41
18.
Zurück zum Zitat Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inform Forens Secur 8(8):1343–1354CrossRef Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inform Forens Secur 8(8):1343–1354CrossRef
19.
Zurück zum Zitat Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: CRYPTO. Springer, pp 62–91 Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: CRYPTO. Springer, pp 62–91
20.
Zurück zum Zitat Li J, Huang X, Li J, Chen X, Xiang Y (2013) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210CrossRef Li J, Huang X, Li J, Chen X, Xiang Y (2013) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210CrossRef
21.
Zurück zum Zitat Li J, Shi Y, Zhang Y (2017) Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage. Int J Commun Syst 30(1):e2942CrossRef Li J, Shi Y, Zhang Y (2017) Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage. Int J Commun Syst 30(1):e2942CrossRef
22.
Zurück zum Zitat Li J, Wang Y, Zhang Y, Han J (2017) Full verifiability for outsourced decryption in attribute based encryption. IEEE Transactions on Services Computing Li J, Wang Y, Zhang Y, Han J (2017) Full verifiability for outsourced decryption in attribute based encryption. IEEE Transactions on Services Computing
23.
Zurück zum Zitat Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12CrossRef Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12CrossRef
24.
Zurück zum Zitat Li W, Xue K, Xue Y, Hong J (2015) Tmacs: a robust and verifiable threshold multi-authority access control system in public cloud storage. IEEE Trans Parallel Distrib Syst 27(5):1484–1496CrossRef Li W, Xue K, Xue Y, Hong J (2015) Tmacs: a robust and verifiable threshold multi-authority access control system in public cloud storage. IEEE Trans Parallel Distrib Syst 27(5):1484–1496CrossRef
25.
Zurück zum Zitat Liao Y, He Y, Li F, Jiang S, Zhou S (2018) Analysis of an abe scheme with verifiable outsourced decryption. Sensors 18(1):176CrossRef Liao Y, He Y, Li F, Jiang S, Zhou S (2018) Analysis of an abe scheme with verifiable outsourced decryption. Sensors 18(1):176CrossRef
26.
Zurück zum Zitat Lin C, He D, Huang X, Xie X, Choo KKR (2018) Blockchain-based system for secure outsourcing of bilinear pairings. Information Sciences Lin C, He D, Huang X, Xie X, Choo KKR (2018) Blockchain-based system for secure outsourcing of bilinear pairings. Information Sciences
27.
Zurück zum Zitat Lin S, Zhang R, Ma H, Wang M (2015) Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inform Forens Secur 10(10):2119–2130CrossRef Lin S, Zhang R, Ma H, Wang M (2015) Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inform Forens Secur 10(10):2119–2130CrossRef
28.
Zurück zum Zitat Lynn B, et al. (2006) The pairing-based cryptography library. Internet: crypto. stanford. edu/pbc/[Mar. 27 2013] Lynn B, et al. (2006) The pairing-based cryptography library. Internet: crypto. stanford. edu/pbc/[Mar. 27 2013]
29.
Zurück zum Zitat Mao X, Lai J, Mei Q, Chen K, Weng J (2015) Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans Depend Secur Comput 13(5):533–546CrossRef Mao X, Lai J, Mei Q, Chen K, Weng J (2015) Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans Depend Secur Comput 13(5):533–546CrossRef
30.
Zurück zum Zitat sNakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system sNakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system
31.
Zurück zum Zitat Qin B, Deng RH, Liu S, Ma S (2015) Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans Inform Forens Secur 10(7):1384–1393CrossRef Qin B, Deng RH, Liu S, Ma S (2015) Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans Inform Forens Secur 10(7):1384–1393CrossRef
32.
Zurück zum Zitat Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: CRYPTO, pp 457–473 Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: CRYPTO, pp 457–473
33.
Zurück zum Zitat Szabo N (1997) Formalizing and securing relationships on public networks. First Monday 2(9) Szabo N (1997) Formalizing and securing relationships on public networks. First Monday 2(9)
34.
Zurück zum Zitat Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Transactions on Information Forensics and Security 11(6):1265–1277CrossRef Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Transactions on Information Forensics and Security 11(6):1265–1277CrossRef
35.
Zurück zum Zitat Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Public key cryptography, pp 53–70 Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Public key cryptography, pp 53–70
36.
Zurück zum Zitat Wu J, Ping L, Ge X, Wang Y, Fu J (2010) Cloud storage as the infrastructure of cloud computing. In: 2010 International conference on intelligent computing and cognitive informatics, pp 380–383 Wu J, Ping L, Ge X, Wang Y, Fu J (2010) Cloud storage as the infrastructure of cloud computing. In: 2010 International conference on intelligent computing and cognitive informatics, pp 380–383
37.
Zurück zum Zitat Xu J, Wen Q, Li W, Jin Z (2015) Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation in cloud computing. IEEE Trans Parallel Distrib Syst 27(1):119– 129CrossRef Xu J, Wen Q, Li W, Jin Z (2015) Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation in cloud computing. IEEE Trans Parallel Distrib Syst 27(1):119– 129CrossRef
38.
Zurück zum Zitat Zheng H, Shao J, Wei G, Hu L, Pan B, Liu K, Mao X (2019) Attribute-based encryption with publicly verifiable outsourced decryption. In: International conference on network and system security. Springer, pp 552–566 Zheng H, Shao J, Wei G, Hu L, Pan B, Liu K, Mao X (2019) Attribute-based encryption with publicly verifiable outsourced decryption. In: International conference on network and system security. Springer, pp 552–566
39.
Zurück zum Zitat Zhou Z, Huang D (2012) Efficient and secure data storage operations for mobile cloud computing. In: 2012 8th international conference on Network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm) , pp 37–45 Zhou Z, Huang D (2012) Efficient and secure data storage operations for mobile cloud computing. In: 2012 8th international conference on Network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm) , pp 37–45
40.
Zurück zum Zitat Zuo C, Shao J, Wei G, Xie M, Ji M (2018) Cca-secure abe with outsourced decryption for fog computing. Futur Gener Comput Syst 78:730–738CrossRef Zuo C, Shao J, Wei G, Xie M, Ji M (2018) Cca-secure abe with outsourced decryption for fog computing. Futur Gener Comput Syst 78:730–738CrossRef
Metadaten
Titel
Attribute-based encryption with outsourced decryption in blockchain
verfasst von
Hui Zheng
Jun Shao
Guiyi Wei
Publikationsdatum
08.06.2020
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 5/2020
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-020-00918-1

Weitere Artikel der Ausgabe 5/2020

Peer-to-Peer Networking and Applications 5/2020 Zur Ausgabe

Premium Partner