Analysis of an ABE Scheme with Verifiable Outsourced Decryption

نویسندگان

  • Yongjian Liao
  • Yichuan He
  • Fagen Li
  • Shaoquan Jiang
  • Shijie Zhou
چکیده

Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users' data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption operations to the cloud service provider. To guarantee the correctness of transformed ciphertexts computed by the cloud server via the outsourced decryption, it is necessary to check the correctness of the outsourced decryption to ensure security for the data of users. Recently, Li et al. proposed a full verifiability of the outsourced decryption of ABE scheme (ABE-VOD) for the authorized users and unauthorized users, which can simultaneously check the correctness of the transformed ciphertext for both them. However, in this paper we show that their ABE-VOD scheme cannot obtain the results which they had shown, such as finding out all invalid ciphertexts, and checking the correctness of the transformed ciphertext for the authorized user via checking it for the unauthorized user. We first construct some invalid ciphertexts which can pass the validity checking in the decryption algorithm. That means their "verify-then-decrypt" skill is unavailable. Next, we show that the method to check the validity of the outsourced decryption for the authorized users via checking it for the unauthorized users is not always correct. That is to say, there exist some invalid ciphertexts which can pass the validity checking for the unauthorized user, but cannot pass the validity checking for the authorized user.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attribute Based Encryption Schemes for Efficient Verifiable Data Sharing

Attribute-based encryption (ABE) with outsourced decryption not only enables finegrained sharing of encrypted data, but also overcomes the effective drawback of the standard ABE schemes. An Attribute based encryption scheme with outsourced decryption allows a third party (e.g., a cloud server) to renovate an ABE cipher text into a (short) El Gamal-type cipher text using a public transformation ...

متن کامل

Abe Enforced Triple Des with Outsourced Decryption in Cloud

Attribute-based encryption allow user to encrypt data using public-key then it decrypt data using private-key in the cloud. ABE provide the public-key one-to-many encryption. Access polices and user attributes are associated with private keys and ciphertexts. The drawbacks of the existing ABE schemes are that decryption involves expensive pairing operations, the number of such operations grows ...

متن کامل

Concrete Attribute-Based Encryption Scheme with Verifiable Outsourced Decryption

As more sensitive data is shared and stored by third-party sites on the internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data is that it can be selectively shared only at a coarse-grained level. Attribute based encryption is a public-key-based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promisin...

متن کامل

Attribute based Encryption and Decryption Technique

Inside a dispersed foriegn atmosphere, anyone receives a untrusted company which has a change for better crucial allowing this foriegn to turn any kind of ABE ciphertext fulfilled through the wearer's features. Stability of ABE technique with outsourced decryption makes certain that a foe (including any destructive cloud) aren't going to be capable to study everything about the encrypted meanin...

متن کامل

A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing

With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره 18  شماره 

صفحات  -

تاریخ انتشار 2018