CP-ABE Scheme with Fast Decryption for Public Cloud
Author:
Affiliation:

Clc Number:

TP309

Fund Project:

National Natural Science Foundation of China (61373163); National Key Technology Research and Development Program of theMinistry of Science and Technology of China (2014BAH11F02, 2014BAH11F01); Science and Technology Support Program of Sichuan Province (2015GZ079); Opening Foundation for the Key Laboratory of Sichuan Province (NDSMS201606); Key Project for Education Department of Sichuan Province (17ZA0322)

  • Article
  • | |
  • Metrics
  • |
  • Reference [27]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    Most of existing CP-ABE (ciphertext-policy attribute-based encryption) schemes have such problems as over-computation and a long calculation time in decryption, which make them difficult to be applied and implemented. To solve this problem, the computation outsourcing is introduced into the design of CP-ABE scheme, a Spark-platform-based CP-ABE scheme with fast decryption for public cloud is proposed. In this scheme, the decryption parallelization algorithm is designed based on the decryption feature of CP-ABE, with which, decryption at both leaf node and root node with over-computation is parallelized. Then, the parallelization tasks are handed over to the Spark cluster. The computation outsourcing makes the most decryption computation done by cloud servers, while the user client only needs an exponential operation, and parallelization greatly improves the speed of decryption. Security analysis shows that the proposed scheme can fight against chosen plaintext attack under both the generic group model and the random oracle model.

    Reference
    [1] Feng CS, Qin ZG, Ding Y, Yu Q. Key techniques of access control for cloud computing. Acta Electronica Sinica, 2015,43(2): 312-319(in Chinese with English abstract). [doi: 10.3969/j.issn.0372-2112.2015.02.017]
    [2] Feng DG, Zhang M, Zhang Y, Xu Z. Study on cloud computing security. Ruan Jian Xue Bao/Journal of Software, 2011,22(1): 71-83(in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3958.htm [doi: 10.3724/SP.J.1001.2011.03958]
    [3] Feng CS, Qin ZG, Yuan D. Techniques of secure storage for cloud data. Chinese Journal of Computers, 2015,38(1):150-163(in Chinese with English abstract). [doi: 10.3724/SP.J.1016.2015.00150]
    [4] Sahai A, Waters B. Fuzzy identity based encryption. In: Proc. of the Advances in Cryptology, Eurocrypt. LNCS, Springer-Verlag, 2005. 457-473. [doi: 10.1007/11426639_27]
    [5] Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Proc. of the 2007 IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11]
    [6] Goyal V, Pandey A, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Juels A, Wright RN, Vimercati SDC, eds. Proc. of the 13th ACM Conf. on Computer and Communications Security (CCS 2006). Alexandria: ACM, 2006. 89-98. [doi: 10.1145/1180405.1180418]
    [7] Ostrovsky R, Sahai A, Waters B. Attribute-Based encryption with non-monotonic access structures. In: Proc. of the 14th ACM Conf. on Computer and Communications Security. New York: ACM, 2007. 1-17. [doi: 10.1145/1315245.1315270]
    [8] Cheung L, Newport C. Provably secure ciphertext policy ABE. In: Proc. of the 14th ACM Conf. on Computer and Communications Security. New York: ACM, 2007. 456-465. [doi: 10.1145/1315245.1315302]
    [9] Goyal V, Jain A, Pandey O, Sahai A. Bounded ciphertext policy attribute based encryption. In: Proc. of the 35th Int'l Colloquium on Automata, Languages and Programming. Berlin: Spring-Verlag, 2008. 579-591. [doi: 10.1007/978-3-540-70583-3_47]
    [10] Li J, Ren K, Zhu B, Wan Z. Privacy-Aware attribute-based encryption with user accountability. In: Proc. of the Int'l Conf. on Information Security. Berlin: Springer-Verlag, 2009. 347-362. [doi: 10.1007/978-3-642-04474-8_28]
    [11] Waters B. Ciphertext-Policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Proc. of the Public Key Cryptography (PKC 2011). Berlin: Springer-Verlag, 2011. 53-70. [doi: 10.1007/978-3-642-19379-8_4]
    [12] Green M, Hohenberger S, Waters B. Outsourcing the decryption of ABE ciphertexts. In: Proc. of the 20th Usenix Conf. on Security. San Francisco: ACM, 2011. 34-34.
    [13] Li J, Jia C, Li J, et al. Outsourcing encryption of attribute-based encryption with MapReduce. In: Proc. of the 14th Int'l Conf. on Information and Communications Security. Berlin: Springer-Verlag, 2012. 191-201. [doi: 10.1007/978-3-642-34129-8_17]
    [14] Zhou Z, Huang D. Efficient and secure data storage operations for mobile cloud computing. In: Proc. of the 8th Int'l Conf. on Network and Service Management. Austria: IEEE, 2012. 37-45.
    [15] Lai J, Deng RH, Guan C, Weng J. Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. on Information Forensics and Security, 2013,8(8):1343-1354. [doi: 10.1109/TIFS.2013.2271848]
    [16] Qin B, Deng R, Liu S, Ma S. Attribute-Based encryption with efficient verifiable outsourced decryption. IEEE Trans. on Information Forensics and Security, 2015,10(7):1384-1393. [doi: 10.1109/TIFS.2015.2410137]
    [17] Lin S, Zhang R, Ma H, Wang M. Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans. on Information Forensics & Security, 2015,10(10):2119-2130. [doi: 10.1109/TIFS.2015.2449264]
    [18] Mao X, Lai J, Mei Q, et al. Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans. on Dependable & Secure Computing, 2016,13(5):533-546. [doi: 10.1109/TDSC.2015.2423669]
    [19] Zhang K, Ma J, Liu J, et al. Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption. Science China Information Sciences, 2016,59(9):99-105. [doi: 10.1007/s11432-016-0012-9]
    [20] Liu Z, Jiang ZL, Wang X, et al. Offline/Online attribute-based encryption with verifiable outsourced decryption. Concurrency & Computation Practice & Experience, 2017. [doi: 10.1002/cpe.3915]
    [21] Boneh D, Franklin M. Identity-Based encryption from the Weil pairing. Siam Journal on Computing, 2001,32(3):213-229. [doi: 10.1137/S0097539701398521]
    [22] Dan B, Lynn B, Shacham H. Short signatures from the Weil pairing. Journal of Cryptology, 2004,17(4):297-319. [doi: 10.1007/s00145-004-0314-9]
    [23] Rockafellar RT. Lagrange multipliers and optimality. Siam Review, 1993,35(2):183-238. [doi: 10.1137/1035044]
    附中文参考文献:
    [1] 冯朝胜,秦志光,袁丁,卿昱.云计算环境下访问控制关键技术.电子学报,2015,43(2):312-319. [doi: 10.3969/j.issn.0372-2112.2015. 02.017]
    [2] 冯登国,张敏,张妍,徐震.云计算安全研究.软件学报,2011,22(1):71-83. http://www.jos.org.cn/1000-9825/3958.htm [doi: 10.3724/SP.J.1001.2011.03958]
    [3] 冯朝胜,秦志光,袁丁.云数据安全存储技术.计算机学报,2015,38(1):150-163. [doi: 10.3724/SP.J.1016.201§.00150]
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

邹莉萍,冯朝胜,秦志光,袁丁,罗王平,李敏.面向公有云的支持快速解密的CP-ABE方案.软件学报,2020,31(6):1817-1828

Copy
Share
Article Metrics
  • Abstract:1878
  • PDF: 4606
  • HTML: 2253
  • Cited by: 0
History
  • Received:January 06,2018
  • Revised:May 08,2018
  • Online: June 04,2020
  • Published: June 06,2020
You are the first2034057Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063