Computer Science ›› 2016, Vol. 43 ›› Issue (Z6): 357-360.doi: 10.11896/j.issn.1002-137X.2016.6A.085

Previous Articles     Next Articles

Attribute-based Encryption Scheme with Outsourcing Decryption Method

DING Xiao-hong, QIN Jing-yuan and WANG Xin   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Sahai and Waters proposed ABE (Attribute-based Encryption) which realizes one to more encryption.ABE has extensive application value.With the continuous development of cloud computing,cloud computing is also closely linked with attribute based encryption.This paper applied the rapid and efficient outsourcing computation technique into ABE decryption algorithm.In cloud computing,the cloud server stores the clients’ ciphertexts.When the client decrypts its remote data,the decryptor uploads the transform key to the cloud server.By using the transform key,the cloud server transforms the ciphertext into semi-ciphertext and sends it to client.The client decrypts the semi-ciphertext and gets the plaintext.This outsourcing computation technique saves the clients’ computation overhead.Through security analysis and efficiency analysis,our proposed scheme is secure and efficient.

Key words: Attribute-based encryption,Outsourcing,Fast decryption

[1] Sahai A,Waters B.Fuzzy identity-based encryption[M]∥Cramer R,ed.EUROCRYPT 2005.Springer,Heidelberg,2005:457-473
[2] Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine grained access control of encrypted data[C]∥ ACM Conference on Computer and Communications Security.2006:89-98
[3] Waters B.Ciphertext-Policy Attribute-Baded Encryption:An Ex-pressive,Efficient,and Provably Secure Realization[C]∥Public Key Cryptography(PKC 2011).2011:53-70
[4] 马丹丹,陈勤,党正芹,等.基于多属性机构的密文策略和加密机制[J].计算机工程,2012,38(10):114-116
[5] Lai Lun-zuo,Deng R H,Guan Chao-wen, et al.Attribute-Based Encryption With Verifiable Outsourced Decryption[J].IEEE Transactions on Information Forensics and Security,2013,8(8):1343-1354
[6] Green M,Hohenberger S,Waters B.Outsourcing the Decryption of ABE Ciphertexts[C]∥Proceedings of the 20th USENIX Conference on Security.2011
[7] Gamal T E.A public key encryptosystem and a signature scheme- based on discrete logarithms[M]∥ Advances in Cryptology:Proceedings of CRYPTO 84.1985:10-18
[8] Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]∥ACM Conference on Computer and Communications Security.2006:89-98
[9] 石岳蓉,郭俊,赵晶晶,等.高效数据外包的基于多授权中心的ABE方案[J].信息技术,2015(2):97-100
[10] Beimel A.Secure Schemes for Secret Sharing and Key Distribution [D].Israel Institute of Technology,Technion,Haifa,Is-rael,1996

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!