Advertisement

FDCO: attribute-based fast data cloud-outsourcing scheme for mobile devices

  • Yanting Zhang
  • Jianwei Liu
  • Zongyang ZhangEmail author
  • Weiran Liu
Regular Contribution
  • 25 Downloads

Abstract

We propose an attribute-based fast data cloud-outsourcing (FDCO) scheme, which shows great performance in mobile devices. Technically, this work is a CCA-secure online/offline key encapsulation scheme based on ciphertext-policy attribute-based encryption with public validity test and indirect user revocation mechanism. We adapt it to a mobile cloud-outsourcing scenario and present a concrete system. Our scheme is equipped with the following desirable properties: First, encapsulation needs only several lightweight online modular addition/multiplication operations, which is appealing to mobile users. Second, it is equipped with an efficient indirect user revocation mechanism to support access credential revocation. Third, it supports public encapsulation validity test, which enables auditors to filter invalid data, so as to prevent attackers from sending invalid data to stuff users’ accounts. Finally, we prove its security against chosen-ciphertext attacks (CCA) in the standard model. We conduct theoretical analyses and extensive experiments to show that our scheme is practical and efficient in application.

Keywords

Attribute-based encryption Public validity test Chosen-ciphertext security Revocable encryption Online/offline encryption 

Notes

Acknowledgements

This study was funded by the National Natural Science Foundation of China (61972017, 61972018, 61932014, 61972310), the Beijing Natural Science Foundation (4182033) and the National Cryptography Development Fund (MMJJ20180215).

Compliance with ethical standards

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

References

  1. 1.
    Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)CrossRefGoogle Scholar
  2. 2.
    Bardou, R., Focardi, R., Kawamoto, Y., Simionato, L., Steel, G., Tsay, J.: Efficient padding oracle attacks on cryptographic hardware. In: Proceedings of the 32nd Annual Cryptology Conference, Advances in Cryptology—CRYPTO 2012, Santa Barbara, CA, USA, August 19–23, 2012, pp. 608–625 (2012)Google Scholar
  3. 3.
    Beimel, A.: Secure schemes for secret sharing and key distribution. Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel (1996)Google Scholar
  4. 4.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20–23 May 2007, Oakland, California, USA, pp. 321–334 (2007)Google Scholar
  5. 5.
    Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encryption with efficient revocation. In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27–31, 2008, pp. 417–426 (2008)Google Scholar
  6. 6.
    Boneh, D., Boyen, X.: Efficient selective-id secure identity-based encryption without random oracles. In: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Advances in Cryptology—EUROCRYPT 2004, Interlaken, Switzerland, May 2–6, 2004, pp. 223–238 (2004)CrossRefGoogle Scholar
  7. 7.
    Caro, A.D., Iovino, V.: jpbc: Java pairing based cryptography. In: Proceedings of the 16th IEEE Symposium on Computers and Communications, ISCC 2011, Kerkyra, Corfu, Greece, June 28–July 1, 2011, pp. 850–855 (2011)Google Scholar
  8. 8.
    Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30–November 3, 2006, pp. 89–98 (2006)Google Scholar
  9. 9.
    Guo, F., Mu, Y., Chen, Z.: Identity-based online/offline encryption. In: 12th International Conference on Financial Cryptography and Data Security, FC 2008, Cozumel, Mexico, January 28–31, 2008, pp. 247–261 (2008)Google Scholar
  10. 10.
    Hohenberger, S., Waters, B.: Online/offline attribute-based encryption. In: Proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, Public-Key Cryptography—PKC 2014, Buenos Aires, Argentina, March 26–28, 2014, pp. 293–310 (2014)Google Scholar
  11. 11.
    Jung, T., Li, X., Wan, Z., Wan, M.: Privacy preserving cloud data access with multi-authorities. In: Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14–19, 2013, pp. 2625–2633 (2013)Google Scholar
  12. 12.
    Kamara, S., Lauter, K.E.: Cryptographic cloud storage. In: Financial Cryptography and Data Security, FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25–28, 2010, Revised Selected Papers, pp. 136–149 (2010)Google Scholar
  13. 13.
    Krawczyk, H., Rabin, T.: Chameleon signatures. In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2000, San Diego, California, USA (2000)Google Scholar
  14. 14.
    Lewko, A.B., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Advances in Cryptology—EUROCRYPT 2010, Monaco/French Riviera, May 30–June 3, 2010, pp. 62–91 (2010)CrossRefGoogle Scholar
  15. 15.
    Lewko, A.B., Waters, B.: Decentralizing attribute-based encryption. In: Proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Advances in Cryptology—EUROCRYPT 2011, Tallinn, Estonia, May 15–19, 2011, pp. 568–588 (2011)CrossRefGoogle Scholar
  16. 16.
    Lewko, A.B., Waters, B.: Unbounded HIBE and attribute-based encryption. In: Proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Advances in Cryptology—EUROCRYPT 2011, Tallinn, Estonia, May 15–19, 2011, pp. 547–567 (2011)Google Scholar
  17. 17.
    Li, J., Zhang, Y., Chen, X., Xiang, Y.: Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72, 1–12 (2018)CrossRefGoogle Scholar
  18. 18.
    Ma, H., Zhang, R., Wan, Z., Lu, Y., Lin, S.: Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing. IEEE Trans. Dependable Secure Comput. 14(6), 679–692 (2017)CrossRefGoogle Scholar
  19. 19.
    Naresh, R., Sayeekumar, M., Karthick, G.M., Supraja, P.: Attribute-based hierarchical file encryption for efficient retrieval of files by DV index tree from cloud using crossover genetic algorithm. Soft Comput. 23(8), 2561–2574 (2019)CrossRefGoogle Scholar
  20. 20.
    Ning, J., Cao, Z., Dong, X., Liang, K., Ma, H., Wei, L.: Auditable \(\sigma \)-time outsourced attribute-based encryption for access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 13(1), 94–105 (2018)CrossRefGoogle Scholar
  21. 21.
    Rouselakis, Y., Waters, B.: Practical constructions and new proof methods for large universe attribute-based encryption. In: 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS’13, Berlin, Germany, November 4–8, 2013, pp. 463–474 (2013)Google Scholar
  22. 22.
    Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Proceedings of the 32nd Annual Cryptology Conference, Advances in Cryptology—CRYPTO 2012, Santa Barbara, CA, USA, August 19–23, 2012, pp. 199–217 (2012)Google Scholar
  23. 23.
    Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Advances in Cryptology—EUROCRYPT 2005, Aarhus, Denmark, May 22–26, 2005, pp. 457–473 (2005)Google Scholar
  24. 24.
    Seo, J.H., Emura, K.: Revocable identity-based encryption revisited: Security model and construction. In: Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, Public-Key Cryptography—PKC 2013, Nara, Japan, February 26–March 1, 2013, pp. 216–234 (2013)CrossRefGoogle Scholar
  25. 25.
    Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. IACR Cryptol. ePrint Arch. 2004, 332 (2004)Google Scholar
  26. 26.
    Uzunkol, O., Kiraz, M.S.: Still wrong use of pairings in cryptography. Appl. Math. Comput. 333, 467–479 (2018)MathSciNetzbMATHGoogle Scholar
  27. 27.
    Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6–9, 2011, pp. 53–70 (2011)CrossRefGoogle Scholar
  28. 28.
    Xue, L., Yu, Y., Li, Y., Au, M.H., Du, X., Yang, B.: Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf. Sci. 479, 640–650 (2019)CrossRefGoogle Scholar
  29. 29.
    Yamada, S., Attrapadung, N., Hanaoka, G., Kunihiro, N.: Generic constructions for chosen-ciphertext secure attribute based encryption. In: Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, Public Key Cryptography—PKC 2011, Taormina, Italy, March 6–9, 2011, pp. 71–89 (2011)CrossRefGoogle Scholar
  30. 30.
    Zhang, Y., Chen, X., Li, J., Wong, D.S., Li, H., You, I.: Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf. Sci. 379, 42–61 (2017)CrossRefGoogle Scholar
  31. 31.
    Zhang, Y., Liu, J., Zhang, Z., Hu, Y.: Multi-authority fast data cloud-outsourcing for mobile devices. In: Proceedings of the 21st International Conference, Information Security ISC 2018, Guildford, UK, September 9–12, 2018, pp. 231–249 (2018)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2019

Authors and Affiliations

  1. 1.School of Cyber Science and TechnologyBeihang UniversityBeijingChina
  2. 2.School of Electronic and Information EngineeringBeihang UniversityBeijingChina
  3. 3.Hefei Innovation Research InstituteBeihang UniversityHefeiChina
  4. 4.ShenYuan Honors CollegeBeihang UniversityBeijingChina

Personalised recommendations