Advanced Search
Volume 40 Issue 12
Nov.  2018
Turn off MathJax
Article Contents
Zhiyuan ZHAO, Lei SUN, Jiafu HU, Shie ZHOU. Efficient Offline/Online Attribute Based Encryption with Verifiable Outsourced Decryption[J]. Journal of Electronics & Information Technology, 2018, 40(12): 2998-3006. doi: 10.11999/JEIT180122
Citation: Zhiyuan ZHAO, Lei SUN, Jiafu HU, Shie ZHOU. Efficient Offline/Online Attribute Based Encryption with Verifiable Outsourced Decryption[J]. Journal of Electronics & Information Technology, 2018, 40(12): 2998-3006. doi: 10.11999/JEIT180122

Efficient Offline/Online Attribute Based Encryption with Verifiable Outsourced Decryption

doi: 10.11999/JEIT180122
Funds:  The National 973 Program of China (2013CB338000), The National Key Research Program of China (2016YFB0501900)
  • Received Date: 2018-01-29
  • Rev Recd Date: 2018-06-11
  • Available Online: 2018-08-30
  • Publish Date: 2018-12-01
  • Attribute based encryption can provide data confidentiality protection and fine-grained access control for fog-cloud computing, however mobile devices in fog cloud computing system are difficult to bear the burdensome computing burden of attribute based encryption. In order to address this problem, an offline/online ciphertext-plicy attribute-based encryption scheme is presented with verifiable outsourced decryption based on the bilinear group of prime order. It can realize the offline/online key generation and data encryption. Simultaneously, it supports the verifiable outsourced decryption. Then, the formal security proofs of its selective chosen plaintext attack security and verifiability are provided. After that, the improved offline/online ciphertext-plicy attribute-based encryption scheme with verifiable outsourced decryption is presented, which reduces the number of bilinear pairings from linear to constant in the transformation phase. Finally, the efficiency of the proposed scheme is analyzed and verified through theoretical analysis and experimental simulation. The experimental results show that the proposed scheme is efficient and practical.
  • loading
  • KHAN S, PARKINSON S, and QIN Yongrui. Fog computing security: A review of current applications and security solutions[J]. Journal of Cloud Computing, 2017, 6(1): 19–41 doi: 10.1186/s13677-017-0090-3
    SAHAI A and WATERS B. Fuzzy identity-based encryption[C]. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 2005: 457–473. doi: 10.1007/11426639_27.
    GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, USA, 2006: 89–98. doi: 10.1145/1180405.1180418.
    BETHENCOURT J, SAHAI A, and WATERS B. Ciphertext-policy attribute-based encryption[C]. Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, USA, 2007: 321–334. doi: 10.1109/SP.2007.11.
    GREEN M, HOHENBERGER S, and WATERS B. Outsourcing the decryption of ABE ciphertexts[C]. Proceedings of the 20th USENIX Conference on Security, San Francisco, USA, 2011: 34.
    LAI Junzuo, DENG R H, GUAN Chaowen, et al. Attribute-based encryption with verifiable outsourced decryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(8): 1343–1354 doi: 10.1109/TIFS.2013.2271848
    ZHAO Zhiyuan and WANG Jianhua. Verifiable outsourced ciphertext-policy attribute-based encryption for mobile cloud computing[J].KSII Transactions on Internet and Information Systems, 2017, 11(6): 3254–3272 doi: 10.3837/tiis.2017.06.024
    FAN Kai, WANG Junxiong, WANG Xin, et al. A secure and verifiable outsourced access control scheme in fog-cloud computing[J]. Sensors, 2017, 17(7): 1695–1710 doi: 10.3390/s17071695
    LI Jiguo, SHA Fengjie, ZHANG Yichen, et al. Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length[J]. Security and Communication Networks, 2017, 2017: 1–11 doi: 10.1155/2017/3596205
    ZHANG Rui, MA Hui, and LU Yao. Fine-grained access control system based on fully outsourced attribute-based encryption[J]. Journal of Systems and Software, 2017, 125(3): 344–353 doi: 10.1016/j.jss.2016.12.018
    EVEN S, GOLDREICH O, and MICALI S. On-line/off-line digital signatures[C]. Proceedings of the Conference on the Theory and Application of Cryptology, Santa Barbara, USA, 1989: 263–275. doi: 10.1007/0-387-34805-0_24.
    LIU J K, BAEK J, ZHOU Jianying, et al. Efficient online/offline identity-based signature for wireless sensor network[J]. International Journal of Information Security, 2010, 9(4): 287–296 doi: 10.1007/s10207-010-0109-y
    GUO Fuchun, MU Yi, and CHEN Zhide. Identity-based online/offline encryption[C]. Proceedings of the International Conference on Financial Cryptography and Data Security, Cozumel, Mexico, 2008: 247–261. doi: 10.1007/978-3-540-85230-8_22.
    LIU J K and ZHOU Jianying. An efficient identity-based online/offline encryption scheme[C]. Proceedings of the International Conference on Applied Cryptography and Network Security, Paris-Rocquencourt, France, 2009: 156–167. doi: 10.1007/978-3-642-01957-9_10.
    CHOW S S M, LIU J K, and ZHOU Jianying. Identity-based online/offline key encapsulation and encryption[C]. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, China, 2011: 52–60. doi: 10.1145/1966913.1966922.
    ROUSELAKIS Y and WATERS B. Practical constructions and new proof methods for large universe attribute-based encryption[C]. Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Berlin, Germany, 2013: 463–474. doi: 10.1145/2508859.2516672.
    HOHENBERGER S and WATERS B. Online/offline attribute-based encryption[C]. Proceedings of the International Workshop on Public Key Cryptography, Buenos Aires, Argentina, 2014: 293–310. doi: 10.1007/978-3-642-54631-0_17.
    LIU Zechao, JIANG Z L, WANG Xuan, et al. Offline/online attribute-based encryption with verifiable outsourced decryption[J]. Concurrency and Computation:Practice and Experience, 2017, 29(7): 1–17 doi: 10.1002/cpe.3915
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(1)  / Tables(1)

    Article Metrics

    Article views (2461) PDF downloads(69) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return