Attribute Based Encryption Schemes for Efficient Verifiable Data Sharing
نویسنده
چکیده
Attribute-based encryption (ABE) with outsourced decryption not only enables finegrained sharing of encrypted data, but also overcomes the effective drawback of the standard ABE schemes. An Attribute based encryption scheme with outsourced decryption allows a third party (e.g., a cloud server) to renovate an ABE cipher text into a (short) El Gamal-type cipher text using a public transformation key provided by a user so that the last can be decrypted much more efficiently than the former by the user. However, a shortcoming of the original outsourced ABE scheme is that the correctness of the cloud server’s transformation cannot be verified by the user. That is, an end user could be cheated into accepting a wrong or maliciously transformed output. A security model of ABE with verifiable outsourced decryption is formalized by introducing a verification key in the output of the encryption algorithm. An approach to convert any ABE scheme with outsourced decryption into an ABE scheme with verifiable outsourced decryption is presented. The new approach is simple, general, and almost optimal. Compared with the original outsourced ABE, verifiable outsourced ABE neither increases the users and the cloud server’s computation costs except some non-dominant operations (e.g., hash computations), nor expands the cipher text size except adding a hash value (which is <20 byte for 80-bit security level).
منابع مشابه
Using Ciphertext Policy Attribute Based Encryption for Verifiable Secret Sharing
Threshold secret sharing schemes are used to divide a given secret by a dealer in parts such that no less than the threshold number of shareholders can reconstruct the secret. However, these schemes are susceptible to the malicious behavior of a shareholder or a dealer. To prevent such attacks, it is necessary to make a provision for verification of the integrity of the shares distributed by th...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملInvestigating the Approaches for improving the Ciphertext Policy Attribute Based Encryption schemes
Ciphertext policy attribute based encryption (CP-ABE) is a technique in which a user with a secret key (containing attributes) is able to decrypt a message only if the attributes in the policy match those defined in the secret key. The existing methods that use reasonably computable decryption policies for CP-ABE, produce the ciphertext of size at least linearly varying with the number of attri...
متن کاملBrowse searchable encryption schemes: Classification, methods and recent developments
With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...
متن کاملNew Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption and Their Application
We propose adaptively secure attribute-based encryption (ABE) schemes for boolean formulas over large universe attributes from the decisional linear (DLIN) assumption, which allow an arbitrary number of attribute reuse in an available formula without the previously employed redundant multiple encoding technique. Based on the key-policy (KP)ABE scheme, we have an adaptively secure communication-...
متن کامل