Advertisement

Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation

  • Jindan Zhang
  • Baocang WangEmail author
  • Fatos Xhafa
  • Xu An WangEmail author
  • Cong Li
Original Research

Abstract

In this paper two new ways for efficient secure outsourcing the decryption of key-policy attribute-based encryption (\(KP-ABE\)) with energy efficiency are proposed. Based on an observation about the permutation property of the access structure for the attribute based encryption schemes, we propose a high efficient way for outsourcing the decryption of KP-ABE, which is suitable for being used in mobile devices. But it can only be used for the ABE schemes having tree-like access structure for the self-enclosed system. The second way is motivated from the fact that almost all the previous work on outsourcing the decryption of \(KP-ABE\) cares little about the ciphertext length. Almost all the previous schemes for secure outsourcing the decryption of ABE have linear length ciphertext with the attributes or the policy. But transferring so long ciphertexts via wireless network for mobile phone can easily run out of battery power, therefore it can not be adapted to practical application scenarios. Thus another new scheme for outsourcing the decryption of ABE but with constant-size ciphertexts is proposed. Furthermore, our second proposal gives a new efficient way for secure outsourcing the decryptor’s secret key to the cloud, which need only one modular exponentiation while all the previous schemes need many. We evaluate the efficiency of our proposals and the results show that our proposals are practical.

Notes

Acknowledgements

The second author and fourth author are the corresponding authors. The first and second author is supported by the National Key Research and Development Program of China under Grant No. 2017YFB0802000, the National Natural Science Foundation of China under Grant Nos. 61572390, U1736111, the Natural Science Foundation of Ningbo City under Grant No. 201601HJ-B01382, and the Open Foundation of Key Laboratory of Cognitive Radio and Information Processing, Ministry of Education (Guilin University of Electronic Technology) under Grant No. CRKL160202. The fourth author is supported by the National Cryptography Development Fund of China Under Grants No. MMJJ20170112, National Key Research and Development Program of China Under Grants No. 2017YFB0802000, National Nature Science Foundation of China (Grant Nos. 61572521, 61772550, U1636114, 61402531), the Natural Science Basic Research Plan in Shaanxi Province of china (Grant Nos. 2016JQ6037) and Guangxi Key Laboratory of Cryptography and Information Security (No. GCIS201610).

References

  1. Angelo DC, Vincenz I (2011) jPBC: java pairing based cryptography. In: Proceeding of the 16th IEEE symposium on computers and communications, ISCC 2011, pp 850–855 URL: http://gas.dia.unisa.it/projects/jpbc/Google Scholar
  2. Attrapadung N (2014) Dual system encryption via doubly selective security framework fully secure functional encryption for regular languages and more. In: Nguyen PQ, Oswald E (eds) EUROCRYPT 2014, vol 8441. Springer, LNCS, New York, pp 557–577.  https://doi.org/10.1007/978-3-642-55220-5_31 CrossRefGoogle Scholar
  3. Attrapadung N, Imai H (2009a) Conjunctive broadcast and attribute-based encryption. In: Shacham H, Waters B (eds) PAIRING 2009, vol 5671. Springer, LNCS, New York, pp 248–265Google Scholar
  4. Attrapadung N, Imai H (2009b) Dual-policy attribute based encryption. In: Abdalla M, Pointcheval D, Fouque PA, Vergnaud D (eds) ACNS 09, vol 5536. Springer, LNCS, New York, pp 168–185Google Scholar
  5. Attrapadung N, Libert B, de Panafieu E (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: Catalano D, Fazio N, Gennaro R, Nicolosi A (eds) (2011), pp 90–108Google Scholar
  6. Canetti R, Garay JA (eds) (2013) CRYPTO 2013, Part II, vol 8043. Springer, LNCS, New YorkzbMATHGoogle Scholar
  7. Catalano D, Fazio N, Gennaro R, Nicolosi A (eds) (2011) PKC 2011, vol 6571. Springer, LNCS, New YorkGoogle Scholar
  8. Chase M (2007) Multi-authority attribute based encryption. In: Vadhan SP (ed) TCC 2007, vol 4392. Springer, LNCS, New York, pp 515–534Google Scholar
  9. Chase M, Chow SSM (2009) Improving privacy and security in multi-authority attribute-based encryption. In: Al-Shaer E, Jha S, Keromytis AD (eds) ACM CCS 09. ACM Press, New York, pp 121–130CrossRefGoogle Scholar
  10. Chen J, Wee H (2013) Fully, (almost) tightly secure IBE and dual system groups. In: Canetti R, Garay JA (eds) (2013), pp 435–460, DOI 10.1007/978-3-642-40084-1_25Google Scholar
  11. Chen J, Wee H (2014a) Doubly spatial encryption from DBDH. Cryptology ePrint Archive, Report 2014/199, URL: http://eprint.iacr.org/2014/199Google Scholar
  12. Chen J, Wee H (2014b) Dual system groups and its applications — compact HIBE and more. Cryptology ePrint Archive, Report 2014/265, URL: http://eprint.iacr.org/2014/265Google Scholar
  13. Cristina D, Elena A, Catalin L, Valentin C (2014) A solution for the management of multimedia sessions in hybrid clouds. Int J Space Based Situat Comput 4(2):77–87CrossRefGoogle Scholar
  14. Garg S, Gentry C, Halevi S, Sahai A, Waters B (2013) Attribute-based encryption for circuits from multilinear maps. In: Canetti R, Garay JA (eds) (2013), pp 479–499, DOI 10.1007/978-3-642-40084-1_27Google Scholar
  15. Garg S, Gentry C, Halevi S, Zhandry M (2014) Fully secure functional encryption without obfuscation. Cryptology ePrint Archive, Report 2014/666, URL: http://eprint.iacr.org/2014/666Google Scholar
  16. Gorbunov S, Vaikuntanathan V, Wee H (2013) Attribute-based encryption for circuits. In: Boneh D, Roughgarden T, Feigenbaum J (eds) 45th ACM STOC. ACM Press, New York, pp 545–554Google Scholar
  17. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Juels A, Wright RN, Vimercati S (eds) ACM CCS 06. ACM Press, New York, pp 89–98 (available as Cryptology ePrint Archive Report 2006/309)CrossRefGoogle Scholar
  18. Green M, Hohenberger S, Waters B (2013) Outsourcing the decryption of abe ciphertexts. In: Proceedings of USENIX security symposim, San FranciscoGoogle Scholar
  19. Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354CrossRefGoogle Scholar
  20. Lewko AB, Waters B (2011) Decentralizing attribute-based encryption. In: Paterson KG (ed) EUROCRYPT 2011, vol 6632. Springer, LNCS, New York, pp 568–588CrossRefGoogle Scholar
  21. Lewko AB, Waters B (2012) New proof methods for attribute-based encryption Achieving full security through selective techniques. In: Safavi-Naini R, Canetti R (eds) CRYPTO 2012, vol 7417. Springer, LNCS, New York, pp 180–198CrossRefGoogle Scholar
  22. Lewko AB, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert H (ed) EUROCRYPT 2010, vol 6110. Springer, LNCS, New York, pp 62–91CrossRefGoogle Scholar
  23. Li J, Huang X, Li J, Chen X, Xiang Y (2013) Securely utsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst.  https://doi.org/10.1109/TPDS.2013.27
  24. Meriem T, Mahmoud B, Fabrice K (2014) An approach for developing an interoperability mechanism between cloud providers. Int J Space Based Situat Comput 4(2):88–99CrossRefGoogle Scholar
  25. Okamoto T, Takashima K (2010) Fully secure functional encryption with general relations from the decisional linear assumption. In: Rabin T (ed) CRYPTO 2010, vol 6223. Springer, LNCS, New York, pp 191–208CrossRefGoogle Scholar
  26. Parno B, Raykova M, Vaikuntanathan V (2012) How to delegate and verify in public: verifiable computation from attribute-based encryption. In: Cramer R (ed) TCC 2012, vol 7194. Springer, LNCS, New York, pp 422–439Google Scholar
  27. Qin B, Deng RH, Liu S, Ma S (2015) Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 10(7):1384–1393CrossRefGoogle Scholar
  28. Sahai A, Waters BR (2005) Fuzzy identity-based encryption. In: Cramer R (ed) EUROCRYPT 2005, vol 3494. Springer, LNCS, New York, pp 457–473CrossRefGoogle Scholar
  29. Shu G, Haixia X (2015) A secure delegation scheme of large polynomial computation in multi-party cloud. Int J Grid and Util Comput 6(2):1–7Google Scholar
  30. Waters B (2009) Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Halevi S (ed) CRYPTO 2009, vol 5677. Springer, LNCS, New York, pp 619–636CrossRefGoogle Scholar
  31. Wang XA, Ma J, Xhafa F (2015) Outsourcing decryption of attribute based encryption with energy efficiency. In: Proceeding of the international conference on P2P, parallel, grid, cloud and internet computing 3PGCIC 2015, pp 444–448Google Scholar
  32. Wang Y, Du J, Cheng X, Liu Z, Lin K (2016) Degradation and encryption for outsourced png images in cloud storage. Int J Grid Util Comput 7(1):22–28CrossRefGoogle Scholar
  33. Yamada S, Attrapadung N, Hanaoka G, Kunihiro N (2011) Generic constructions for chosen-ciphertext secure attribute based encryption. In: Catalano D, Fazio N, Gennaro R, Nicolosi A (eds) (2011), pp 71–89Google Scholar
  34. Yamada S, Attrapadung N, Hanaoka G, Kunihiro N (2014) A framework and compact constructions for non-monotonic attribute-based encryption. In: Krawczyk H (ed) PKC 2014, vol 8383. Springer, LNCS, New York, pp 275–292.  https://doi.org/10.1007/978-3-642-54631-0_16 Google Scholar
  35. Zhu S, Yang X (2015) Protecting data in cloud environment with attribute-based encryption. Int J Grid Util Comput 6(2):91–97CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2017

Authors and Affiliations

  1. 1.State Key Laboratory of Integrated Service NetworksXidian UniversityXi’anPeople’s Republic of China
  2. 2.Guangxi Key Laboratory of Cryptography and Information SecurityGuilin University of Electronic TechnologyGuilinPeople’s Republic of China
  3. 3.Xianyang Vocational Technique CollegeXianyangPeople’s Republic of China
  4. 4.Department of Computer ScienceUniversitat Politcnica de CatalunyaBarcelonaSpain
  5. 5.Key Laboratory of Information and Network SecurityEngineering University of Chinese Armed Police ForceXi’anPeople’s Republic of China

Personalised recommendations