iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/s00500-016-2271-2
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing | Soft Computing Skip to main content
Log in

Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

In the attribute-based encryption (ABE) systems, users can encrypt and decrypt messages based on their attributes. Because of the flexibility of ABE, it is more and more widely used in various network environments. However, complex functionality of ABE may cause an enormous computational cost. This reason greatly restricts the application of ABE in practice. In order to minimize the local computation of ABE, we introduce the concept of verifiable outsourced ABE system, in which key generation center, encryptor and decryptor, are able to outsource their computing tasks to the corresponding service providers, respectively, to reduce the local load. In addition, they are also able to verify the correctness of outsourcing calculation efficiently by using the outsourcing verification services. This is useful to save local computational resources, especially for mobile devices. Then, we propose a specific verifiable outsourced ABE scheme and prove its adaptive security in the standard model using the dual-system encryption method. Finally, we introduce how to deploy our outsourced CP-ABE scheme in cloud computing environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Atallah MJ, Li J (2005) Secure outsourcing of sequence comparisons. Int J Inf Secur 4(4):277–287. doi:10.1007/s10207-005-0070-3

    Article  Google Scholar 

  • Atallah MJ, Pantazopoulos KN, Rice JR, Spafford EH (2001) Secure outsourcing of scientific computations. Adv Comput 54:215–272. doi:10.1016/S0065-2458(01)80019-X

    Article  Google Scholar 

  • Beimel A (1996) Secure schemes for secret sharing and key distribution. PhD thesis, Israel Institute of Technology, Technion, Haifa, Israel

  • Benjamin D, Atallah MJ (2008) Private and cheating-free outsourcing of algebraic computations. In: Sixth annual conference on privacy, security and trust, PST 2008, October 1–3, 2008, Fredericton, New Brunswick, Canada, pp 240–245. doi:10.1109/PST.2008.12

  • Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (S&P 2007), 20–23 May 2007, Oakland, California, USA, pp 321–334. doi:10.1109/SP.2007.11

  • Boneh D, Goh E-J, Nissim K (2005) Evaluating 2-dnf formulas on ciphertexts. In: Proceedings of Theory of cryptography, second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005, pp 325–341. doi:10.1007/978-3-540-30576-7_18

  • Chen X, Li J, Susilo W (2012) Efficient fair conditional payments for outsourcing computations. IEEE Trans Inf Forensics Secur 7(6):1687–1694. doi:10.1109/TIFS.2012.2210880

    Article  Google Scholar 

  • Chen X, Li J, Ma J, Tang Q, Lou W (2014) New algorithms for secure outsourcing of modular exponentiations. IEEE Trans Parallel Distrib Syst 25(9):2386–2396. doi:10.1109/TPDS.2013.180

    Article  Google Scholar 

  • Chen X, Huang X, Li J, Ma J, Lou W, Wong DS (2015) New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans Inf Forensics Secur 10(1):69–78. doi:10.1109/TIFS.2014.2363765

    Article  Google Scholar 

  • Chen X, Susilo W, Li J, Wong DS, Ma J, Tang S, Tang Q (2015) Efficient algorithms for secure outsourcing of bilinear pairings. Theor Comput Sci 562:112-–121. doi:10.1016/j.tcs.2014.09.038

    Article  MATH  MathSciNet  Google Scholar 

  • Cheung L, Newport C (2007) Provably secure ciphertext policy ABE. In: Proceedings of the 2007 ACM conference on computer and communications security, CCS 2007, Alexandria, Virginia, USA, October 28–31, 2007, pp 456–465. doi:10.1145/1315245.1315302

  • Fu Z, Kui R, Jiangang S, Xingming S, Fengxiao H (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEEE Trans Parallel Distrib Syst. doi:10.1109/TPDS.2015.2506573

    Google Scholar 

  • Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015b) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans 98-B(1): 190–200. http://search.ieice.org/bin/summary.php?id=e98-b_1_190

  • Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, CCS 2006, Alexandria, VA, USA, October 30–November 3, 2006, pp 89–98. doi:10.1145/1180405.1180418

  • Green M, Hohenberger S, Waters B (2011) Outsourcing the decryption of ABE ciphertexts. In: Proceedings of 20th USENIX security symposium, San Francisco, CA, USA, August 8–12, 2011. http://static.usenix.org/events/sec11/tech/full_papers/Green.pdf

  • He D, Zeadally S, Wu L (2015) Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst J. doi:10.1109/JSYST.2015.2428620

    Google Scholar 

  • He D, Kumar N, Shen H, Lee J-H (2016) One-to-many authentication for access control in mobile pay-tv systems. Sci China Inf Sci. doi:10.1007/s11432-015-5469-5

    MathSciNet  Google Scholar 

  • He D, Zeadally S, Kumar N, Lee J-H (2016) Anonymous authentication for wireless body area networks with provable security. IEEE Syst J. doi:10.1109/JSYST.2016.2544805

    Google Scholar 

  • Huang X, Xiang Y, Bertino E, Zhou J (2014) Robust multi-factor authentication for fragile communications. IEEE Trans Dependable Secure Comput 11(6):568–581. doi:10.1109/TDSC.2013.2297110

    Article  Google Scholar 

  • Huang X, Liu JK, Tang S, Xiang Y, Liang K, Xu L, Zhou J (2015) Cost-effective authentic and anonymous data sharing with forward security. IEEE Trans Comput 64(4):971–983. doi:10.1109/TC.2014.2315619

    Article  MATH  MathSciNet  Google Scholar 

  • Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354. doi:10.1109/TIFS.2013.2271848

    Article  Google Scholar 

  • Lewko A, Waters B (2010) New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Proceedings of 7th theory of cryptography conference on theory of cryptography, TCC 2010, Zurich, Switzerland, February 9–11, 2010, pp 455–479. doi:10.1007/978-3-642-11799-2_27

  • Lewko A, Waters B (2012) New proof methods for attribute-based encryption: achieving full security through selective techniques. In: Proceedings of 32nd annual cryptology conference on advances in cryptology-CRYPTO 2012, Santa Barbara, CA, USA, August 19–23, 2012, pp 180–198. doi:10.1007/978-3-642-32009-5_12

  • Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Proceedings of advances in cryptology-EUROCRYPT 2010, 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30–June 3, 2010, pp 62–91. doi:10.1007/978-3-642-13190-5_4

  • Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210. doi:10.1109/TPDS.2013.271

    Article  Google Scholar 

  • Li J, Jia C, Li J, Chen X (2012) Outsourcing encryption of attribute-based encryption with mapreduce. In: Proceedings of 14th international conference on information and communications security, ICICS 2012, Hong Kong, China, October 29–31, 2012, pp 191–201. doi:10.1007/978-3-642-34129-8_17

  • Ren Y, Shen J, Wang J, Han J, Lee S (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317–324

    Google Scholar 

  • Rouselakis Y, Waters B (2015) Efficient statically-secure large-universe multi-authority attribute-based encryption. IACR Cryptol ePrint Arch 2015: 16. http://eprint.iacr.org/2015/016

  • Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Proceedings of advances in cryptology-EUROCRYPT 2005, 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005, pp 457–473. doi:10.1007/11426639_27

  • Shen J, Tan H, Moh S, Chung I, Liu Q, Sun X (2015) Enhanced secure sensor association and key management in wireless body area networks. J Commun Netw 17(5):453–462. doi:10.1109/JCN.2015.000083

    Article  Google Scholar 

  • Shen J, Tan H, Wang J, Wang J, Lee S (2015b) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Internet Technol 16(1):171–178

    Google Scholar 

  • Wang H, Zheng Z, Lei W, Wang Y (2015) Adaptively secure outsourcing ciphertext-policy attribute-based encryption. J Comput Res Dev 52(10):2270–2280

    Google Scholar 

  • Waters B (2008) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. IACR Cryptol ePrint Arch 2008: 290. http://eprint.iacr.org/2008/290

  • Waters Brent (2009) Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Proceedings of 29th annual international cryptology conference on advances in cryptology-CRYPTO 2009, Santa Barbara, CA, USA, August 16–20, 2009, pp 619–636. doi:10.1007/978-3-642-03356-8_36

  • Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In Proceedings of public key cryptography-PKC 2011-14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011, pp 53–70. doi:10.1007/978-3-642-19379-8_4

Download references

Acknowledgments

This study was funded by the National Natural Science Foundation of China (Grant Numbers 61173139, 61272434, 61502218, 61572294, 61572379), the Natural Science Foundation of Shandong Province (Grant Number ZR2013FQ021), Outstanding Young Scientists Foundation Grant of Shandong Province (Grant Number BS2014DX016), the CICAEET fund, the PAPD fund and the Natural Science Foundation of Hubei Province of China (Grant Number 2015CFB257).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Debiao He.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Communicated by V. Loia.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, H., He, D., Shen, J. et al. Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing. Soft Comput 21, 7325–7335 (2017). https://doi.org/10.1007/s00500-016-2271-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-016-2271-2

Keywords

Navigation