Skip to main content
Log in

Blockchain-Based Fair Payment for ABE with Outsourced Decryption

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Attribute-based encryption (ABE) is an advanced public-key encryption supporting fine-grained access control and flexible sharing of encrypted data. However, in many real-world scenarios, users working with resource-limited devices have to outsource the decryption task due to its huge computational overhead while the decryption party is usually considered to be untrusted, thus leading to the fact that the verifiability of computation results is as important as the privacy. Fair payment, a solution to ensure the interests of both participants involved (i.e., user and worker), is introduced. Generally, fairness is guaranteed by the public verifiability so that the correctness of outsourced result can be easily judged by a trusted third party (TTP) when dispute occurs, which is called optimistic fairness. To remove the TTP and achieve robust fairness, most existing solutions try to handle the verifiability issue with zero-knowledge proofs (ZKPs) and blockchain. Nonetheless, there has not been a proper and efficient solution to obtain robust fairness in ABE outsourcing decryption (ABE-OD) scenarios. To address this issue, in this paper we propose a blockchain-based fair payment for ABE-OD scheme. In particular, we construct a CP-ABE-OD scheme with both public and private verifiability based on existing generic schemes and employ smart contract to guarantee the payment fairness, integrated by IPFS to solve the task data storage. Theoretical analysis and experimental results show that our scheme is secure and efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques, Springer, pp 457–473

  2. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security, pp 89–98

  3. Green M, Hohenberger S, Waters B et al (2011) Outsourcing the decryption of abe ciphertexts. In: USENIX security symposium

  4. Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Transactions on information forensics and security 8(8):1343–1354

    Article  Google Scholar 

  5. Li J, Huang X, Li J, Chen X, Xiang Y (2013) Securely outsourcing attribute-based encryption with checkability. IEEE Transactions on Parallel and Distributed Systems 25(8):2201–2210

    Article  Google Scholar 

  6. Lin S, Zhang R, Ma H, Wang M (2015) Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Transactions on Information Forensics and Security 10(10):2119–2130

    Article  Google Scholar 

  7. Ma H, Zhang R, Wan Z, Lu Y, Lin S (2015) Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing. IEEE transactions on dependable and secure computing 14(6):679–692

    Article  Google Scholar 

  8. Mao X, Lai J, Mei Q, Chen K, Weng J (2015) Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Transactions on dependable and secure computing 13(5):533–546

    Article  Google Scholar 

  9. Qin B, Deng RH, Liu S, Ma S (2015) Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 10(7):1384–1393

    Article  Google Scholar 

  10. Asokan N, Schunter M, Waidner M (1997) Optimistic protocols for fair exchange. In: Proceedings of the 4th ACM Conference on Computer and Communications Security, pp 7–17

  11. Banasik W, Dziembowski S, Malinowski D (2016) Efficient zero-knowledge contingent payments in cryptocurrencies without scripts. In: European symposium on research in computer security, Springer, pp 261–280

  12. Campanelli M, Gennaro R, Goldfeder S, Nizzardo L (2017) Zero-knowledge contingent payments revisited: Attacks and payments for services. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp 229–243

  13. Zhou Z, Cao X, Liu J, Zhang B, Ren K (2021) Zero knowledge contingent payments for trained neural networks. In: European Symposium on Research in Computer Security, Springer, pp 628–648

  14. Lin C, He D, Huang X, Xie X, Choo KKR (2020) Blockchain-based system for secure outsourcing of bilinear pairings. Inform Sci 527:590–601

    Article  MathSciNet  MATH  Google Scholar 

  15. Lin C, He D, Huang X, Choo KKR (2021) Obfp: Optimized blockchain-based fair payment for outsourcing computations in cloud computing. IEEE Transactions on Information Forensics and Security 16:3241–3253

    Article  Google Scholar 

  16. Zhang Y, Deng RH, Liu X, Zheng D (2018) Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inform Sci 462:262–277

    Article  MathSciNet  Google Scholar 

  17. Zhang Y, Deng R, Liu X, Zheng D (2018a) Outsourcing service fair payment based on blockchain and its applications in cloud computing. IEEE Trans Serv Comput

  18. Zheng H, Shao J, Wei G (2020) Attribute-based encryption with outsourced decryption in blockchain. Peer-to-Peer Netw Appl 13:1643–1655

    Article  Google Scholar 

  19. Fuchsbauer G (2019) Wi is not enough: Zero-knowledge contingent (service) payments revisited. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp 49–62

  20. Hu S, Cai C, Wang Q, Wang C, Luo X, Ren K (2018) Searching an encrypted cloud meets blockchain: A decentralized, reliable and fair realization. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications, IEEE, pp 792–800

  21. Lewko A, Waters B (2012) New proof methods for attribute-based encryption: Achieving full security through selective techniques. In: Annual Cryptology Conference, Springer, pp 180–198

  22. Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp 62–91

  23. Rouselakis Y, Waters B (2013) Practical constructions and new proof methods for large universe attribute-based encryption. In: Proceedings of the 2013 ACM SIGSAC conference on Comp Commun Sec, pp 463–474

  24. Waters B (2011) Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: International Workshop on Public Key Cryptography, Springer, pp 53–70

  25. Xiong H, Sun J (2017) Comments on verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing. IEEE Transactions Dependable  Secure Computing 14(4):461–462

  26. Chen X, Li J, Susilo W (2012) Efficient fair conditional payments for outsourcing computations. IEEE Transactions on Information Forensics and Security 7(6):1687–1694

    Article  Google Scholar 

  27. Dong C, Wang Y, Aldweesh A, McCorry P, van Moorsel A (2017) Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp 211–227

  28. Beimel A (1996) Secure schemes for secret sharing and key distribution. phd thesis israel institute of technology technion

  29. Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review p 21260

  30. Szabo N (1997) Formalizing and securing relationships on public networks. First monday

  31. Wood G et al (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151(2014):1–32

    Google Scholar 

  32. Benet J (2014) Ipfs-content addressed, versioned, p2p file system. arXiv preprint arXiv:1407.3561

  33. Akinyele JA, Garman C, Miers I, Pagano MW, Rushanan M, Green M, Rubin AD (2013) Charm: a framework for rapidly prototyping cryptosystems. Journal of Cryptographic Engineering

Download references

Funding

This work was supported in part by National Natural Science Foundation of China (62002120), Shanghai Rising-Star Program (No.22QA1403800), Innovation Program of Shanghai Municipal Education Commission (2021-01-07-00-08-E00101) and NSFC-ISF Joint Scientific Research Program (61961146004) and the “Digital Silk Road” Shanghai International Joint Lab of Trustworthy Intelligent Software (Grant No. 22510750100).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Junqing Gong.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hong, L., Zhang, K., Gong, J. et al. Blockchain-Based Fair Payment for ABE with Outsourced Decryption. Peer-to-Peer Netw. Appl. 16, 312–327 (2023). https://doi.org/10.1007/s12083-022-01406-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-022-01406-4

Keywords

Navigation