Soft Computing

, Volume 21, Issue 24, pp 7325–7335 | Cite as

Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing

  • Hao Wang
  • Debiao He
  • Jian Shen
  • Zhihua Zheng
  • Chuan Zhao
  • Minghao Zhao
Methodologies and Application


In the attribute-based encryption (ABE) systems, users can encrypt and decrypt messages based on their attributes. Because of the flexibility of ABE, it is more and more widely used in various network environments. However, complex functionality of ABE may cause an enormous computational cost. This reason greatly restricts the application of ABE in practice. In order to minimize the local computation of ABE, we introduce the concept of verifiable outsourced ABE system, in which key generation center, encryptor and decryptor, are able to outsource their computing tasks to the corresponding service providers, respectively, to reduce the local load. In addition, they are also able to verify the correctness of outsourcing calculation efficiently by using the outsourcing verification services. This is useful to save local computational resources, especially for mobile devices. Then, we propose a specific verifiable outsourced ABE scheme and prove its adaptive security in the standard model using the dual-system encryption method. Finally, we introduce how to deploy our outsourced CP-ABE scheme in cloud computing environment.


CP-ABE Outsourcing Verifiable Cloud computing Adaptively secure 



This study was funded by the National Natural Science Foundation of China (Grant Numbers 61173139, 61272434, 61502218, 61572294, 61572379), the Natural Science Foundation of Shandong Province (Grant Number ZR2013FQ021), Outstanding Young Scientists Foundation Grant of Shandong Province (Grant Number BS2014DX016), the CICAEET fund, the PAPD fund and the Natural Science Foundation of Hubei Province of China (Grant Number 2015CFB257).

Compliance with ethical standards

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.


  1. Atallah MJ, Li J (2005) Secure outsourcing of sequence comparisons. Int J Inf Secur 4(4):277–287. doi: 10.1007/s10207-005-0070-3 CrossRefGoogle Scholar
  2. Atallah MJ, Pantazopoulos KN, Rice JR, Spafford EH (2001) Secure outsourcing of scientific computations. Adv Comput 54:215–272. doi: 10.1016/S0065-2458(01)80019-X CrossRefGoogle Scholar
  3. Beimel A (1996) Secure schemes for secret sharing and key distribution. PhD thesis, Israel Institute of Technology, Technion, Haifa, IsraelGoogle Scholar
  4. Benjamin D, Atallah MJ (2008) Private and cheating-free outsourcing of algebraic computations. In: Sixth annual conference on privacy, security and trust, PST 2008, October 1–3, 2008, Fredericton, New Brunswick, Canada, pp 240–245. doi: 10.1109/PST.2008.12
  5. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (S&P 2007), 20–23 May 2007, Oakland, California, USA, pp 321–334. doi: 10.1109/SP.2007.11
  6. Boneh D, Goh E-J, Nissim K (2005) Evaluating 2-dnf formulas on ciphertexts. In: Proceedings of Theory of cryptography, second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005, pp 325–341. doi: 10.1007/978-3-540-30576-7_18
  7. Chen X, Li J, Susilo W (2012) Efficient fair conditional payments for outsourcing computations. IEEE Trans Inf Forensics Secur 7(6):1687–1694. doi: 10.1109/TIFS.2012.2210880 CrossRefGoogle Scholar
  8. Chen X, Li J, Ma J, Tang Q, Lou W (2014) New algorithms for secure outsourcing of modular exponentiations. IEEE Trans Parallel Distrib Syst 25(9):2386–2396. doi: 10.1109/TPDS.2013.180 CrossRefGoogle Scholar
  9. Chen X, Huang X, Li J, Ma J, Lou W, Wong DS (2015) New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans Inf Forensics Secur 10(1):69–78. doi: 10.1109/TIFS.2014.2363765 CrossRefGoogle Scholar
  10. Chen X, Susilo W, Li J, Wong DS, Ma J, Tang S, Tang Q (2015) Efficient algorithms for secure outsourcing of bilinear pairings. Theor Comput Sci 562:112-–121. doi: 10.1016/j.tcs.2014.09.038 CrossRefzbMATHMathSciNetGoogle Scholar
  11. Cheung L, Newport C (2007) Provably secure ciphertext policy ABE. In: Proceedings of the 2007 ACM conference on computer and communications security, CCS 2007, Alexandria, Virginia, USA, October 28–31, 2007, pp 456–465. doi: 10.1145/1315245.1315302
  12. Fu Z, Kui R, Jiangang S, Xingming S, Fengxiao H (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEEE Trans Parallel Distrib Syst. doi: 10.1109/TPDS.2015.2506573 Google Scholar
  13. Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015b) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans 98-B(1): 190–200.
  14. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, CCS 2006, Alexandria, VA, USA, October 30–November 3, 2006, pp 89–98. doi: 10.1145/1180405.1180418
  15. Green M, Hohenberger S, Waters B (2011) Outsourcing the decryption of ABE ciphertexts. In: Proceedings of 20th USENIX security symposium, San Francisco, CA, USA, August 8–12, 2011.
  16. He D, Zeadally S, Wu L (2015) Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst J. doi: 10.1109/JSYST.2015.2428620 Google Scholar
  17. He D, Kumar N, Shen H, Lee J-H (2016) One-to-many authentication for access control in mobile pay-tv systems. Sci China Inf Sci. doi: 10.1007/s11432-015-5469-5 MathSciNetGoogle Scholar
  18. He D, Zeadally S, Kumar N, Lee J-H (2016) Anonymous authentication for wireless body area networks with provable security. IEEE Syst J. doi: 10.1109/JSYST.2016.2544805 Google Scholar
  19. Huang X, Xiang Y, Bertino E, Zhou J (2014) Robust multi-factor authentication for fragile communications. IEEE Trans Dependable Secure Comput 11(6):568–581. doi: 10.1109/TDSC.2013.2297110 CrossRefGoogle Scholar
  20. Huang X, Liu JK, Tang S, Xiang Y, Liang K, Xu L, Zhou J (2015) Cost-effective authentic and anonymous data sharing with forward security. IEEE Trans Comput 64(4):971–983. doi: 10.1109/TC.2014.2315619 CrossRefzbMATHMathSciNetGoogle Scholar
  21. Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354. doi: 10.1109/TIFS.2013.2271848 CrossRefGoogle Scholar
  22. Lewko A, Waters B (2010) New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Proceedings of 7th theory of cryptography conference on theory of cryptography, TCC 2010, Zurich, Switzerland, February 9–11, 2010, pp 455–479. doi: 10.1007/978-3-642-11799-2_27
  23. Lewko A, Waters B (2012) New proof methods for attribute-based encryption: achieving full security through selective techniques. In: Proceedings of 32nd annual cryptology conference on advances in cryptology-CRYPTO 2012, Santa Barbara, CA, USA, August 19–23, 2012, pp 180–198. doi: 10.1007/978-3-642-32009-5_12
  24. Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Proceedings of advances in cryptology-EUROCRYPT 2010, 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30–June 3, 2010, pp 62–91. doi: 10.1007/978-3-642-13190-5_4
  25. Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210. doi: 10.1109/TPDS.2013.271 CrossRefGoogle Scholar
  26. Li J, Jia C, Li J, Chen X (2012) Outsourcing encryption of attribute-based encryption with mapreduce. In: Proceedings of 14th international conference on information and communications security, ICICS 2012, Hong Kong, China, October 29–31, 2012, pp 191–201. doi: 10.1007/978-3-642-34129-8_17
  27. Ren Y, Shen J, Wang J, Han J, Lee S (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317–324Google Scholar
  28. Rouselakis Y, Waters B (2015) Efficient statically-secure large-universe multi-authority attribute-based encryption. IACR Cryptol ePrint Arch 2015: 16.
  29. Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Proceedings of advances in cryptology-EUROCRYPT 2005, 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005, pp 457–473. doi: 10.1007/11426639_27
  30. Shen J, Tan H, Moh S, Chung I, Liu Q, Sun X (2015) Enhanced secure sensor association and key management in wireless body area networks. J Commun Netw 17(5):453–462. doi: 10.1109/JCN.2015.000083 CrossRefGoogle Scholar
  31. Shen J, Tan H, Wang J, Wang J, Lee S (2015b) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Internet Technol 16(1):171–178Google Scholar
  32. Wang H, Zheng Z, Lei W, Wang Y (2015) Adaptively secure outsourcing ciphertext-policy attribute-based encryption. J Comput Res Dev 52(10):2270–2280Google Scholar
  33. Waters B (2008) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. IACR Cryptol ePrint Arch 2008: 290.
  34. Waters Brent (2009) Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Proceedings of 29th annual international cryptology conference on advances in cryptology-CRYPTO 2009, Santa Barbara, CA, USA, August 16–20, 2009, pp 619–636. doi: 10.1007/978-3-642-03356-8_36
  35. Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In Proceedings of public key cryptography-PKC 2011-14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011, pp 53–70. doi: 10.1007/978-3-642-19379-8_4

Copyright information

© Springer-Verlag Berlin Heidelberg 2016

Authors and Affiliations

  1. 1.School of Information Science and EngineeringShandong Normal UniversityJinanChina
  2. 2.State Key Lab of Software Engineering, Computer SchoolWuhan UniversityWuhanChina
  3. 3.School of Computer and SoftwareNanjing University of Information Science and TechnologyNanjingChina
  4. 4.School of Computer Science and TechnologyShandong UniversityJinanChina

Personalised recommendations