Advanced Search
Volume 40 Issue 12
Nov.  2018
Turn off MathJax
Article Contents
Han Tao, Zhu Yue-Fei. Adaptive Spatial Steganography Based on Cannys Edge Detection[J]. Journal of Electronics & Information Technology, 2015, 37(5): 1266-1270. doi: 10.11999/JEIT141121
Citation: Zhiyuan ZHAO, Lei SUN, Jiafu HU, Shie ZHOU. Efficient Offline/Online Attribute Based Encryption with Verifiable Outsourced Decryption[J]. Journal of Electronics & Information Technology, 2018, 40(12): 2998-3006. doi: 10.11999/JEIT180122

Efficient Offline/Online Attribute Based Encryption with Verifiable Outsourced Decryption

doi: 10.11999/JEIT180122
Funds:  The National 973 Program of China (2013CB338000), The National Key Research Program of China (2016YFB0501900)
  • Received Date: 2018-01-29
  • Rev Recd Date: 2018-06-11
  • Available Online: 2018-08-30
  • Publish Date: 2018-12-01
  • Attribute based encryption can provide data confidentiality protection and fine-grained access control for fog-cloud computing, however mobile devices in fog cloud computing system are difficult to bear the burdensome computing burden of attribute based encryption. In order to address this problem, an offline/online ciphertext-plicy attribute-based encryption scheme is presented with verifiable outsourced decryption based on the bilinear group of prime order. It can realize the offline/online key generation and data encryption. Simultaneously, it supports the verifiable outsourced decryption. Then, the formal security proofs of its selective chosen plaintext attack security and verifiability are provided. After that, the improved offline/online ciphertext-plicy attribute-based encryption scheme with verifiable outsourced decryption is presented, which reduces the number of bilinear pairings from linear to constant in the transformation phase. Finally, the efficiency of the proposed scheme is analyzed and verified through theoretical analysis and experimental simulation. The experimental results show that the proposed scheme is efficient and practical.
  • KHAN S, PARKINSON S, and QIN Yongrui. Fog computing security: A review of current applications and security solutions[J]. Journal of Cloud Computing, 2017, 6(1): 19–41 doi: 10.1186/s13677-017-0090-3
    SAHAI A and WATERS B. Fuzzy identity-based encryption[C]. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 2005: 457–473. doi: 10.1007/11426639_27.
    GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, USA, 2006: 89–98. doi: 10.1145/1180405.1180418.
    BETHENCOURT J, SAHAI A, and WATERS B. Ciphertext-policy attribute-based encryption[C]. Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, USA, 2007: 321–334. doi: 10.1109/SP.2007.11.
    GREEN M, HOHENBERGER S, and WATERS B. Outsourcing the decryption of ABE ciphertexts[C]. Proceedings of the 20th USENIX Conference on Security, San Francisco, USA, 2011: 34.
    LAI Junzuo, DENG R H, GUAN Chaowen, et al. Attribute-based encryption with verifiable outsourced decryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(8): 1343–1354 doi: 10.1109/TIFS.2013.2271848
    ZHAO Zhiyuan and WANG Jianhua. Verifiable outsourced ciphertext-policy attribute-based encryption for mobile cloud computing[J].KSII Transactions on Internet and Information Systems, 2017, 11(6): 3254–3272 doi: 10.3837/tiis.2017.06.024
    FAN Kai, WANG Junxiong, WANG Xin, et al. A secure and verifiable outsourced access control scheme in fog-cloud computing[J]. Sensors, 2017, 17(7): 1695–1710 doi: 10.3390/s17071695
    LI Jiguo, SHA Fengjie, ZHANG Yichen, et al. Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length[J]. Security and Communication Networks, 2017, 2017: 1–11 doi: 10.1155/2017/3596205
    ZHANG Rui, MA Hui, and LU Yao. Fine-grained access control system based on fully outsourced attribute-based encryption[J]. Journal of Systems and Software, 2017, 125(3): 344–353 doi: 10.1016/j.jss.2016.12.018
    EVEN S, GOLDREICH O, and MICALI S. On-line/off-line digital signatures[C]. Proceedings of the Conference on the Theory and Application of Cryptology, Santa Barbara, USA, 1989: 263–275. doi: 10.1007/0-387-34805-0_24.
    LIU J K, BAEK J, ZHOU Jianying, et al. Efficient online/offline identity-based signature for wireless sensor network[J]. International Journal of Information Security, 2010, 9(4): 287–296 doi: 10.1007/s10207-010-0109-y
    GUO Fuchun, MU Yi, and CHEN Zhide. Identity-based online/offline encryption[C]. Proceedings of the International Conference on Financial Cryptography and Data Security, Cozumel, Mexico, 2008: 247–261. doi: 10.1007/978-3-540-85230-8_22.
    LIU J K and ZHOU Jianying. An efficient identity-based online/offline encryption scheme[C]. Proceedings of the International Conference on Applied Cryptography and Network Security, Paris-Rocquencourt, France, 2009: 156–167. doi: 10.1007/978-3-642-01957-9_10.
    CHOW S S M, LIU J K, and ZHOU Jianying. Identity-based online/offline key encapsulation and encryption[C]. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, China, 2011: 52–60. doi: 10.1145/1966913.1966922.
    ROUSELAKIS Y and WATERS B. Practical constructions and new proof methods for large universe attribute-based encryption[C]. Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Berlin, Germany, 2013: 463–474. doi: 10.1145/2508859.2516672.
    HOHENBERGER S and WATERS B. Online/offline attribute-based encryption[C]. Proceedings of the International Workshop on Public Key Cryptography, Buenos Aires, Argentina, 2014: 293–310. doi: 10.1007/978-3-642-54631-0_17.
    LIU Zechao, JIANG Z L, WANG Xuan, et al. Offline/online attribute-based encryption with verifiable outsourced decryption[J]. Concurrency and Computation:Practice and Experience, 2017, 29(7): 1–17 doi: 10.1002/cpe.3915
  • Cited by

    Periodical cited type(10)

    1. 任志敏,曾文军,张良. 一种基于图片边缘轮廓的信息隐藏方法. 山西电子技术. 2022(04): 5-8 .
    2. 王海龙,柳林,纪文璐. 改进插值及择优阈值Canny算法的边缘检测. 计算机仿真. 2020(05): 394-398 .
    3. 吴翰,江巨浪. 基于边缘检测的高斯噪声滤波算法. 安庆师范大学学报(自然科学版). 2018(01): 38-40+50 .
    4. 刘应红,孙树亮. 基于汉明码和Logistic-正弦映射的图像隐写. 郑州大学学报(理学版). 2018(03): 22-26 .
    5. 宋晓峰,林少锋,韩鹍,寇万里. 图像自适应隐写和隐写分析技术进展. 电子信息对抗技术. 2017(01): 70-76 .
    6. 汤光明,边媛,韦大伟,高瞻瞻,朱垚臻. 一种动态更新失真代价的自适应±k隐写算法. 电子与信息学报. 2017(01): 58-65 . 本站查看
    7. 王丽娜,谭选择,徐一波,翟黎明. 基于纹理复杂度的JPEG图像自适应隐写. 武汉大学学报(理学版). 2017(05): 421-426 .
    8. 谢印庆,姜莉,王鲁云,黄超,刘婷. 一种快速车流量检测算法. 哈尔滨理工大学学报. 2016(04): 19-24 .
    9. 王昂. 海上舰艇作战虚拟视景图像系统仿真研究. 计算机仿真. 2016(04): 419-423 .
    10. 李宁波,潘峰,李军,李秀广. 基于S-UNIWARD的图像自适应空域隐写术. 计算机工程与设计. 2016(10): 2627-2631 .

    Other cited types(12)

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(1)  / Tables(1)

    Article Metrics

    Article views (2509) PDF downloads(72) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return