DocumentCode :
110839
Title :
Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
Author :
Lin, S. ; Zhang, R. ; Ma, H. ; Wang, M.
Author_Institution :
State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
Volume :
10
Issue :
10
fYear :
2015
fDate :
Oct. 2015
Firstpage :
2119
Lastpage :
2130
Abstract :
Attribute-based encryption (ABE) is a promising technique for fine-grained access control of encrypted data in a cloud storage, however, decryption involved in the ABEs is usually too expensive for resource-constrained front-end users, which greatly hinders its practical popularity. In order to reduce the decryption overhead for a user to recover the plaintext, Green et al. suggested to outsource the majority of the decryption work without revealing actually data or private keys. To ensure the third-party service honestly computes the outsourced work, Lai et al. provided a requirement of verifiability to the decryption of ABE, but their scheme doubled the size of the underlying ABE ciphertext and the computation costs. Roughly speaking, their main idea is to use a parallel encryption technique, while one of the encryption components is used for the verification purpose. Hence, the bandwidth and the computation cost are doubled. In this paper, we investigate the same problem. In particular, we propose a more efficient and generic construction of ABE with verifiable outsourced decryption based on an attribute-based key encapsulation mechanism, a symmetric-key encryption scheme and a commitment scheme. Then, we prove the security and the verification soundness of our constructed ABE scheme in the standard model. Finally, we instantiate our scheme with concrete building blocks. Compared with Lai et al.´s scheme, our scheme reduces the bandwidth and the computation costs almost by half.
Keywords :
authorisation; cloud computing; data encapsulation; parallel programming; private key cryptography; ABE ciphertext; ABE decryption; attribute-based encryption; attribute-based key encapsulation mechanism; cloud storage; commitment scheme; computation cost; decryption overhead reduction; encrypted data; encryption components; fine-grained access control; parallel encryption technique; plaintext recovery; private keys; resource-constrained front-end users; security proof; symmetric-key encryption scheme; third-party service; verifiability requirement; verifiable outsourced decryption; verification soundness; Access control; Computational modeling; Encryption; Outsourcing; Transforms; Attribute-based encryption; access control; outsourced decryption; verifiability;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2015.2449264
Filename :
7131527
Link To Document :
بازگشت