Skip to main content
Erschienen in: Soft Computing 3/2018

09.01.2017 | Foundations

Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption

verfasst von: Jing Li, Xiong Li, Licheng Wang, Debiao He, Haseeb Ahmad, Xinxin Niu

Erschienen in: Soft Computing | Ausgabe 3/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Attributed-based encryption (ABE) is a promising cryptographic access control mechanism with a rich expressiveness of ABE policies. Due to the high complexities of encryption and decryption, users are burdened with large computation cost. Fortunately, outsourcing technologies can be used to reduce the computation overhead for the ABE schemes. In the recent decade, the achievements of the outsourced ciphertext-policy ABE (CP-ABE) schemes are inspiring. But, the outsourcing encryption algorithms for CP-ABE schemes are not addressed properly since the encryption exponents are dynamic. In this paper, we present an efficient outsourced CP-ABE scheme with checkability, where the number of the exponential operations in the encryption can be reduced to a constant by introducing a blinding algorithm. Meanwhile, the ciphertext size is not increased. Furthermore, to guarantee the correctness of our scheme, we provide the verification mechanism based on a collision-resistance hash function, which allows the users to efficiently check the validity of messages and outsourced computation results. Besides, the proposed scheme is secure against replayable chosen ciphertext attacks based on Green’s outsourcing security model. Intensive experiments are carried out to illustrate the efficiency of the proposed scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Fußnoten
1
The function f is just defined based on a given hash function. If the pair of plaintext–ciphertext \((m,C_{1})\) satisfies the verification equation \(c_{12}=\hbox {hash}(c_{11},m,pk)\), where \(C_{1}=(c_{11},c_{12})\). Then \(f(\textit{PK},C_{1},m)=1\)
 
Literatur
Zurück zum Zitat Beimel A (1996) Secure schemes for secret sharing and key distribution. Israel Institute of Technology, Technion, Haifa Beimel A (1996) Secure schemes for secret sharing and key distribution. Israel Institute of Technology, Technion, Haifa
Zurück zum Zitat Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy (SP ’07). IEEE, pp 321–334 Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy (SP ’07). IEEE, pp 321–334
Zurück zum Zitat Bobba R, Khurana H, Prabhakaran M (2009) Attribute-sets: a practically motivated enhancement to attribute-based encryption. In: European symposium on research in computer security. Springer, Berlin, pp 587–604 Bobba R, Khurana H, Prabhakaran M (2009) Attribute-sets: a practically motivated enhancement to attribute-based encryption. In: European symposium on research in computer security. Springer, Berlin, pp 587–604
Zurück zum Zitat Fu Z, Sun X, Li Q et al (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200CrossRef Fu Z, Sun X, Li Q et al (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200CrossRef
Zurück zum Zitat Goyal V, Jain A, Pandey O et al (2008) Bounded ciphertext policy attribute based encryption. In: International colloquium on automata, languages, and programming. Springer, Berlin, pp 579–591 Goyal V, Jain A, Pandey O et al (2008) Bounded ciphertext policy attribute based encryption. In: International colloquium on automata, languages, and programming. Springer, Berlin, pp 579–591
Zurück zum Zitat Goyal V, Pandey O, Sahai A et al (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 89–98 Goyal V, Pandey O, Sahai A et al (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 89–98
Zurück zum Zitat Green M, Hohenberger S, Waters B (2011) Outsourcing the decryption of ABE ciphertexts. In: USENIX security symposium, vol 2011 Green M, Hohenberger S, Waters B (2011) Outsourcing the decryption of ABE ciphertexts. In: USENIX security symposium, vol 2011
Zurück zum Zitat He D, Kumar N, Wang H et al (2016b) A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network. IEEE Trans Dependable Secur Comput. doi:10.1109/TDSC.2016.2596286 He D, Kumar N, Wang H et al (2016b) A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network. IEEE Trans Dependable Secur Comput. doi:10.​1109/​TDSC.​2016.​2596286
Zurück zum Zitat Huang X, Li J, Li J et al (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210CrossRef Huang X, Li J, Li J et al (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210CrossRef
Zurück zum Zitat Ibraimi L, Tang Q, Hartel P et al (2009) Efficient and provable secure ciphertext-policy attribute-based encryption schemes. In: International conference on information security practice and experience. Springer, Berlin, pp 1–12 Ibraimi L, Tang Q, Hartel P et al (2009) Efficient and provable secure ciphertext-policy attribute-based encryption schemes. In: International conference on information security practice and experience. Springer, Berlin, pp 1–12
Zurück zum Zitat Islam SH, Khan MK (2014) Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems. J Med Syst 38(10):1–16CrossRef Islam SH, Khan MK (2014) Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems. J Med Syst 38(10):1–16CrossRef
Zurück zum Zitat Khan MK (2009) Fingerprint biometric-based self-authentication and deniable authentication schemes for the electronic world. IETE Tech Rev 26(3):191–195CrossRef Khan MK (2009) Fingerprint biometric-based self-authentication and deniable authentication schemes for the electronic world. IETE Tech Rev 26(3):191–195CrossRef
Zurück zum Zitat Lai J, Deng R H, Yang Y et al (2013) Adaptable ciphertext-policy attribute-based encryption. In: International conference on pairing-based cryptography. Springer, Berlin, pp 199–214 Lai J, Deng R H, Yang Y et al (2013) Adaptable ciphertext-policy attribute-based encryption. In: International conference on pairing-based cryptography. Springer, Berlin, pp 199–214
Zurück zum Zitat Lewko A, Sahai A, Waters B (2010) Revocation systems with very small private keys. In: IEEE symposium on security and privacy. IEEE, pp 273–285 Lewko A, Sahai A, Waters B (2010) Revocation systems with very small private keys. In: IEEE symposium on security and privacy. IEEE, pp 273–285
Zurück zum Zitat Li J, Jia C, Li J et al (2012) Outsourcing encryption of attribute-based encryption with mapreduce. In: International conference on information and communications security. Springer, Berlin, pp 191–201 Li J, Jia C, Li J et al (2012) Outsourcing encryption of attribute-based encryption with mapreduce. In: International conference on information and communications security. Springer, Berlin, pp 191–201
Zurück zum Zitat Li X, Ma J, Wang W, Xiong Y, Zhang J (2013) A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Math Comput Model 58(1):85–95CrossRef Li X, Ma J, Wang W, Xiong Y, Zhang J (2013) A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Math Comput Model 58(1):85–95CrossRef
Zurück zum Zitat Li X, Niu J, Wang Z, Chen C (2014) Applying biometrics to design three-factor remote user authentication scheme with key agreement. Secur Commun Netw 7(10):1488–1497 Li X, Niu J, Wang Z, Chen C (2014) Applying biometrics to design three-factor remote user authentication scheme with key agreement. Secur Commun Netw 7(10):1488–1497
Zurück zum Zitat Li X, Niu J, Liao J, Liang W (2015) Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update. Int J Commun Syst 28(2):374–82CrossRef Li X, Niu J, Liao J, Liang W (2015) Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update. Int J Commun Syst 28(2):374–82CrossRef
Zurück zum Zitat Li X, Li J, Huang F (2016) A secure cloud storage system supporting privacy-preserving fuzzy deduplication. Soft Comput 20(4):1437C1448 Li X, Li J, Huang F (2016) A secure cloud storage system supporting privacy-preserving fuzzy deduplication. Soft Comput 20(4):1437C1448
Zurück zum Zitat Lin S, Zhang R, Ma H, Wang S (2015) Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 10(10):2119–2130CrossRef Lin S, Zhang R, Ma H, Wang S (2015) Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 10(10):2119–2130CrossRef
Zurück zum Zitat Liu Z, Weng J, Li J, Yang L et al (2016) Cloud-based electronic health record system supporting fuzzy keyword search. Soft Comput 20(8):3243–3255CrossRef Liu Z, Weng J, Li J, Yang L et al (2016) Cloud-based electronic health record system supporting fuzzy keyword search. Soft Comput 20(8):3243–3255CrossRef
Zurück zum Zitat Mao X, Lai J, Mei Q, Chen K (2015) Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans Dependable Secure Comput 13(5):533–546 Mao X, Lai J, Mei Q, Chen K (2015) Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans Dependable Secure Comput 13(5):533–546
Zurück zum Zitat Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM conference on computer and communications security. ACM, pp 195–203 Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM conference on computer and communications security. ACM, pp 195–203
Zurück zum Zitat Qin B, Deng RH, Liu S et al (2015) Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 10(7):1384–1393CrossRef Qin B, Deng RH, Liu S et al (2015) Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 10(7):1384–1393CrossRef
Zurück zum Zitat Ren YJ, Shen J, Wang J et al (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317–323 Ren YJ, Shen J, Wang J et al (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317–323
Zurück zum Zitat Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 457–473 Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 457–473
Zurück zum Zitat Shen J, Tan H, Moh S et al (2015) Enhanced secure sensor association and key management in wireless body area networks. J Commun Netw 17(5):453–462CrossRef Shen J, Tan H, Moh S et al (2015) Enhanced secure sensor association and key management in wireless body area networks. J Commun Netw 17(5):453–462CrossRef
Zurück zum Zitat Siddiqui Z, Abdullah AH, Khan MK et al (2014) Smart environment as a service: three factor cloud based user authentication for telecare medical information system. J Med Syst 38(1):1–14CrossRef Siddiqui Z, Abdullah AH, Khan MK et al (2014) Smart environment as a service: three factor cloud based user authentication for telecare medical information system. J Med Syst 38(1):1–14CrossRef
Zurück zum Zitat Waters B (2011) Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: International workshop on public key cryptography. Springer, Berlin, pp 53–70 Waters B (2011) Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: International workshop on public key cryptography. Springer, Berlin, pp 53–70
Zurück zum Zitat Xhafa F, Wang J, Chen X et al (2014) An efficient PHR service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795–1802CrossRef Xhafa F, Wang J, Chen X et al (2014) An efficient PHR service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795–1802CrossRef
Zurück zum Zitat Xia Z, Wang X, Zhang L et al (2016a) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594–2608CrossRef Xia Z, Wang X, Zhang L et al (2016a) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594–2608CrossRef
Zurück zum Zitat Xia Z, Wang X, Sun X et al (2016b) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352CrossRef Xia Z, Wang X, Sun X et al (2016b) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352CrossRef
Zurück zum Zitat Zhou Z, Huang D (2012) Efficient and secure data storage operations for mobile cloud computing. In: Proceedings of the 8th international conference on network and service management. International Federation for Information Processing, pp 37–45 Zhou Z, Huang D (2012) Efficient and secure data storage operations for mobile cloud computing. In: Proceedings of the 8th international conference on network and service management. International Federation for Information Processing, pp 37–45
Metadaten
Titel
Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption
verfasst von
Jing Li
Xiong Li
Licheng Wang
Debiao He
Haseeb Ahmad
Xinxin Niu
Publikationsdatum
09.01.2017
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 3/2018
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-017-2482-1

Weitere Artikel der Ausgabe 3/2018

Soft Computing 3/2018 Zur Ausgabe

Premium Partner