Skip to main content
Erschienen in: Soft Computing 24/2017

13.07.2016 | Methodologies and Application

Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing

verfasst von: Hao Wang, Debiao He, Jian Shen, Zhihua Zheng, Chuan Zhao, Minghao Zhao

Erschienen in: Soft Computing | Ausgabe 24/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the attribute-based encryption (ABE) systems, users can encrypt and decrypt messages based on their attributes. Because of the flexibility of ABE, it is more and more widely used in various network environments. However, complex functionality of ABE may cause an enormous computational cost. This reason greatly restricts the application of ABE in practice. In order to minimize the local computation of ABE, we introduce the concept of verifiable outsourced ABE system, in which key generation center, encryptor and decryptor, are able to outsource their computing tasks to the corresponding service providers, respectively, to reduce the local load. In addition, they are also able to verify the correctness of outsourcing calculation efficiently by using the outsourcing verification services. This is useful to save local computational resources, especially for mobile devices. Then, we propose a specific verifiable outsourced ABE scheme and prove its adaptive security in the standard model using the dual-system encryption method. Finally, we introduce how to deploy our outsourced CP-ABE scheme in cloud computing environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Beimel A (1996) Secure schemes for secret sharing and key distribution. PhD thesis, Israel Institute of Technology, Technion, Haifa, Israel Beimel A (1996) Secure schemes for secret sharing and key distribution. PhD thesis, Israel Institute of Technology, Technion, Haifa, Israel
Zurück zum Zitat Benjamin D, Atallah MJ (2008) Private and cheating-free outsourcing of algebraic computations. In: Sixth annual conference on privacy, security and trust, PST 2008, October 1–3, 2008, Fredericton, New Brunswick, Canada, pp 240–245. doi:10.1109/PST.2008.12 Benjamin D, Atallah MJ (2008) Private and cheating-free outsourcing of algebraic computations. In: Sixth annual conference on privacy, security and trust, PST 2008, October 1–3, 2008, Fredericton, New Brunswick, Canada, pp 240–245. doi:10.​1109/​PST.​2008.​12
Zurück zum Zitat Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (S&P 2007), 20–23 May 2007, Oakland, California, USA, pp 321–334. doi:10.1109/SP.2007.11 Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (S&P 2007), 20–23 May 2007, Oakland, California, USA, pp 321–334. doi:10.​1109/​SP.​2007.​11
Zurück zum Zitat Boneh D, Goh E-J, Nissim K (2005) Evaluating 2-dnf formulas on ciphertexts. In: Proceedings of Theory of cryptography, second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005, pp 325–341. doi:10.1007/978-3-540-30576-7_18 Boneh D, Goh E-J, Nissim K (2005) Evaluating 2-dnf formulas on ciphertexts. In: Proceedings of Theory of cryptography, second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005, pp 325–341. doi:10.​1007/​978-3-540-30576-7_​18
Zurück zum Zitat Cheung L, Newport C (2007) Provably secure ciphertext policy ABE. In: Proceedings of the 2007 ACM conference on computer and communications security, CCS 2007, Alexandria, Virginia, USA, October 28–31, 2007, pp 456–465. doi:10.1145/1315245.1315302 Cheung L, Newport C (2007) Provably secure ciphertext policy ABE. In: Proceedings of the 2007 ACM conference on computer and communications security, CCS 2007, Alexandria, Virginia, USA, October 28–31, 2007, pp 456–465. doi:10.​1145/​1315245.​1315302
Zurück zum Zitat Fu Z, Kui R, Jiangang S, Xingming S, Fengxiao H (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEEE Trans Parallel Distrib Syst. doi:10.1109/TPDS.2015.2506573 Fu Z, Kui R, Jiangang S, Xingming S, Fengxiao H (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEEE Trans Parallel Distrib Syst. doi:10.​1109/​TPDS.​2015.​2506573
Zurück zum Zitat Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, CCS 2006, Alexandria, VA, USA, October 30–November 3, 2006, pp 89–98. doi:10.1145/1180405.1180418 Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, CCS 2006, Alexandria, VA, USA, October 30–November 3, 2006, pp 89–98. doi:10.​1145/​1180405.​1180418
Zurück zum Zitat Lewko A, Waters B (2010) New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Proceedings of 7th theory of cryptography conference on theory of cryptography, TCC 2010, Zurich, Switzerland, February 9–11, 2010, pp 455–479. doi:10.1007/978-3-642-11799-2_27 Lewko A, Waters B (2010) New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Proceedings of 7th theory of cryptography conference on theory of cryptography, TCC 2010, Zurich, Switzerland, February 9–11, 2010, pp 455–479. doi:10.​1007/​978-3-642-11799-2_​27
Zurück zum Zitat Lewko A, Waters B (2012) New proof methods for attribute-based encryption: achieving full security through selective techniques. In: Proceedings of 32nd annual cryptology conference on advances in cryptology-CRYPTO 2012, Santa Barbara, CA, USA, August 19–23, 2012, pp 180–198. doi:10.1007/978-3-642-32009-5_12 Lewko A, Waters B (2012) New proof methods for attribute-based encryption: achieving full security through selective techniques. In: Proceedings of 32nd annual cryptology conference on advances in cryptology-CRYPTO 2012, Santa Barbara, CA, USA, August 19–23, 2012, pp 180–198. doi:10.​1007/​978-3-642-32009-5_​12
Zurück zum Zitat Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Proceedings of advances in cryptology-EUROCRYPT 2010, 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30–June 3, 2010, pp 62–91. doi:10.1007/978-3-642-13190-5_4 Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Proceedings of advances in cryptology-EUROCRYPT 2010, 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30–June 3, 2010, pp 62–91. doi:10.​1007/​978-3-642-13190-5_​4
Zurück zum Zitat Li J, Jia C, Li J, Chen X (2012) Outsourcing encryption of attribute-based encryption with mapreduce. In: Proceedings of 14th international conference on information and communications security, ICICS 2012, Hong Kong, China, October 29–31, 2012, pp 191–201. doi:10.1007/978-3-642-34129-8_17 Li J, Jia C, Li J, Chen X (2012) Outsourcing encryption of attribute-based encryption with mapreduce. In: Proceedings of 14th international conference on information and communications security, ICICS 2012, Hong Kong, China, October 29–31, 2012, pp 191–201. doi:10.​1007/​978-3-642-34129-8_​17
Zurück zum Zitat Ren Y, Shen J, Wang J, Han J, Lee S (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317–324 Ren Y, Shen J, Wang J, Han J, Lee S (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317–324
Zurück zum Zitat Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Proceedings of advances in cryptology-EUROCRYPT 2005, 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005, pp 457–473. doi:10.1007/11426639_27 Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Proceedings of advances in cryptology-EUROCRYPT 2005, 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005, pp 457–473. doi:10.​1007/​11426639_​27
Zurück zum Zitat Shen J, Tan H, Wang J, Wang J, Lee S (2015b) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Internet Technol 16(1):171–178 Shen J, Tan H, Wang J, Wang J, Lee S (2015b) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Internet Technol 16(1):171–178
Zurück zum Zitat Wang H, Zheng Z, Lei W, Wang Y (2015) Adaptively secure outsourcing ciphertext-policy attribute-based encryption. J Comput Res Dev 52(10):2270–2280 Wang H, Zheng Z, Lei W, Wang Y (2015) Adaptively secure outsourcing ciphertext-policy attribute-based encryption. J Comput Res Dev 52(10):2270–2280
Zurück zum Zitat Waters Brent (2009) Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Proceedings of 29th annual international cryptology conference on advances in cryptology-CRYPTO 2009, Santa Barbara, CA, USA, August 16–20, 2009, pp 619–636. doi:10.1007/978-3-642-03356-8_36 Waters Brent (2009) Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Proceedings of 29th annual international cryptology conference on advances in cryptology-CRYPTO 2009, Santa Barbara, CA, USA, August 16–20, 2009, pp 619–636. doi:10.​1007/​978-3-642-03356-8_​36
Zurück zum Zitat Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In Proceedings of public key cryptography-PKC 2011-14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011, pp 53–70. doi:10.1007/978-3-642-19379-8_4 Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In Proceedings of public key cryptography-PKC 2011-14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011, pp 53–70. doi:10.​1007/​978-3-642-19379-8_​4
Metadaten
Titel
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
verfasst von
Hao Wang
Debiao He
Jian Shen
Zhihua Zheng
Chuan Zhao
Minghao Zhao
Publikationsdatum
13.07.2016
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 24/2017
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-016-2271-2

Weitere Artikel der Ausgabe 24/2017

Soft Computing 24/2017 Zur Ausgabe

Premium Partner