Skip to main content
Log in

Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Verifiable outsourced attribute-based encryption (VO-ABE) enables one-to-many data sharing and fine-grained access control under lower trust, making it suitable for cloud or edge systems involving resource-constrained devices. There is no fully outsourced and fully verifiable attribute-based encryption scheme or key-policy VO-ABE scheme. Moreover, the previous VO-ABE schemes require multiple rounds of interaction or high verification costs to support verifiable outsourced key generation and verifiable outsourced encryption. To address these issues, in this paper, we propose an effective key-policy fully outsourced and fully verifiable attribute-based encryption scheme supporting verifiable outsourced key generation, encryption, and decryption simultaneously. We formally define two new properties: outsourced key generation verifiability and outsourced encryption verifiability. Analysis and simulation show that the proposed scheme performs well and is practical. All local computational overheads of the proposed scheme are constant and do not increase with the number of attributes or the complexity of access structures.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

No datasets were generated or analysed during the current study.

References

  1. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings 24, pp. 457–473. Springer (2005)

    Chapter  Google Scholar 

  2. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)

    Chapter  Google Scholar 

  3. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP’07), pp. 321–334. IEEE (2007)

    Chapter  Google Scholar 

  4. Waters, B.: Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Dario, C., Nelly, F., Rosario, G., Antonio, N. (eds.) International Workshop on Public Key Cryptography, pp. 53–70. Springer (2011)

    Google Scholar 

  5. Rouselakis, Y., Waters, B.: Practical constructions and new proof methods for large universe attribute-based encryption. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM (2013)

    Google Scholar 

  6. Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: 20th USENIX Security Symposium (USENIX Security 11) (2011)

  7. Wahaballa, A., Qin, Z., Abdalla, H., Abdellatief, M., Elfaki, M.A.: Oblivious transfer with hidden access control and outsourced decryption from deterministic finite automata-based functional encryption for an in-vehicle sensor database system. Trans. Emerging Telecommun. Technol. 33(5), 3870 (2022)

    Article  Google Scholar 

  8. Ge, C., Liu, Z., Susilo, W., Fang, L., Wang, H.: Attribute-based encryption with reliable outsourced decryption in cloud computing using smart contract. IEEE Transactions on Dependable and Secure Computing, IEEE (2023)

  9. Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. In: 2012 8th International Conference on Network and Service Management (cnsm) and 2012 Workshop on Systems Virtualiztion Management (svm), pp. 37–45. IEEE (2012)

  10. Li, J., Chen, X., Li, J., Jia, C., Ma, J., Lou, W.: Fine-grained access control system based on outsourced attribute-based encryption. In: Jason, C., Sushil, J., Keith, M. (eds.) Computer Security–ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings 18, pp. 592–609. Springer (2013)

    Chapter  Google Scholar 

  11. Zhang, R., Ma, H., Lu, Y.: Fine-grained access control system based on fully outsourced attribute-based encryption. J. Syst. Softw. 125, 344–353 (2017)

    Article  Google Scholar 

  12. Lai, J., Deng, R.H., Guan, C., Weng, J.: Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Info. Forensics Security 8(8), 1343–1354 (2013)

    Article  Google Scholar 

  13. Lin, S., Zhang, R., Ma, H., Wang, M.: Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Info. Forensics Secur. 10(10), 2119–2130 (2015)

    Article  Google Scholar 

  14. Hahn, C., Kwon, H., Hur, J.: Trustworthy delegation toward securing mobile healthcare cyber-physical systems. IEEE Internet Thing J. 6(4), 6301–6309 (2018)

    Article  Google Scholar 

  15. Qin, B., Deng, R.H., Liu, S., Ma, S.: Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans. Info. Forensics Security 10(7), 1384–1393 (2015)

    Article  Google Scholar 

  16. Mao, X., Lai, J., Mei, Q., Chen, K., Weng, J.: Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Dependable Secure Comput. 13(5), 533–546 (2015)

    Article  Google Scholar 

  17. Li, J., Wang, Y., Zhang, Y., Han, J.: Full verifiability for outsourced decryption in attribute based encryption. IEEE Trans. Serv. Comput. 13(3), 478–487 (2017)

    Article  Google Scholar 

  18. Li, J., Sha, F., Zhang, Y., Huang, X., Shen, J.: Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length. Security Commun. Netw. 2017, 1–11 (2017)

    Article  Google Scholar 

  19. Islam, M.A., Madria, S.K.: Attribute-based encryption scheme for secure multi-group data sharing in cloud. IEEE Trans. Services Comput. 15(4), 2158–2172 (2020)

    Article  Google Scholar 

  20. Hahn, C., Kim, J.: Verifiable outsourced decryption of encrypted data from heterogeneous trust networks. IEEE Internet Things J. 9(22), 22559–22570 (2022)

    Article  Google Scholar 

  21. Liu, S., Yu, J., Hu, C., Li, M.: Traceable multiauthority attribute-based encryption with outsourced decryption and hidden policy for CIoT. Wireless Commun. Mobile Comput. 2021, 1–16 (2021)

    Google Scholar 

  22. Xie, C., Shi, R.H., Zhang, X., Wang, P., Guo, W.: Verifiable outsourcing EMRs scheme with attribute-based encryption in cloud-edge environments. J Info Security Appl 76, 103526 (2023)

    Google Scholar 

  23. Ma, H., Zhang, R., Wan, Z., Lu, Y., Lin, S.: Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing. IEEE Trans. Dependable Secure Comput 14(6), 679–692 (2015)

    Article  Google Scholar 

  24. Xiong, H., Sun, J.: Comments on “verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing.” IEEE Trans. Dependable Secure Comput. 14(4), 461–462 (2017)

    Article  Google Scholar 

  25. Li, Z., Li, W., Jin, Z., Zhang, H., Wen, Q.: An efficient ABE scheme with verifiable outsourced encryption and decryption. IEEE Access 7, 29023–29037 (2019)

    Article  Google Scholar 

  26. Premkamal, P.K., Pasupuleti, S.K., Alphonse, P.: A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud. J. Ambient Intell. Human. Comput. 10, 2693–2707 (2019)

    Article  Google Scholar 

  27. Li, J., Huang, X., Li, J., Chen, X., Xiang, Y.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25(8), 2201–2210 (2013)

    Article  Google Scholar 

  28. Wang, H., He, D., Shen, J., Zheng, Z., Zhao, C., Zhao, M.: Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing. Soft Comput. 21, 7325–7335 (2017)

    Article  Google Scholar 

  29. Canetti, R., Krawczyk, H., Nielsen, J.B.: Relaxing chosen-ciphertext security. In: Boneh, D. (ed.) Advances in Cryptology-CRYPTO 2003: 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003. Proceedings 23, pp. 565–582. Springer (2023)

    Google Scholar 

  30. Bellare, M., Garay, J.A., Rabin, T.: Fast batch verification for modular exponentiation and digital signatures. In: Advances in Cryptology–EUROCRYPT’98: International Conference on the Theory and Application of Cryptographic Techniques Espoo, Finland, May 31–June 4, 1998 Proceedings 17, pp. 236–250. Springer (1998)

    Chapter  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Social Science Fund of China under Grant No.21XTQ015. The authors thank the anonymous reviewers for their detailed review and constructive comments.

Funding

Funding was provided by the National Social Science Fund of China (Grant No. 21XTQ015).

Author information

Authors and Affiliations

Authors

Contributions

XZ: Data curation, Formal analysis, Software, Writing-Original draft preparation. ZH: Conceptualization, Methodology, Writing-Reviewing and Editing, Supervision.

Corresponding author

Correspondence to Zhenjie Huang.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhao, X., Huang, Z. Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing. Cluster Comput (2024). https://doi.org/10.1007/s10586-024-04423-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10586-024-04423-5

Keywords

Navigation