• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Su Zelin, Zhang Wenfang, Wang Xiaomin. Outsourced Attribute-Based Encryption Scheme with Policy Updating and Verifiable Ciphertext[J]. Journal of Computer Research and Development, 2024, 61(12): 3088-3097. DOI: 10.7544/issn1000-1239.202220133
Citation: Su Zelin, Zhang Wenfang, Wang Xiaomin. Outsourced Attribute-Based Encryption Scheme with Policy Updating and Verifiable Ciphertext[J]. Journal of Computer Research and Development, 2024, 61(12): 3088-3097. DOI: 10.7544/issn1000-1239.202220133

Outsourced Attribute-Based Encryption Scheme with Policy Updating and Verifiable Ciphertext

Funds: This work was supported by the National Natural Science Foundation of China (U2468201) and the Key Program for Sichuan Science and Technology (2024ZHCG0001).
More Information
  • Author Bio:

    Su Zelin: born in 1997. Master. His main research interests include cryptography and attribute-based encryption

    Zhang Wenfang: born in 1978. PhD, professor, PhD supervisor. Her main research interests include cryptography and information security

    Wang Xiaomin: born in 1974. PhD, professor, PhD supervisor. His main research interests include information security and rail transit safety engineering

  • Received Date: January 28, 2022
  • Revised Date: May 20, 2024
  • Available Online: September 12, 2024
  • Attribute-based encryption is a new access control scheme based on cryptography, which is suitable for data sharing. However, the large computational and communication costs of encryption and access policy updating limit the practical application of attribute-based encryption. Moreover, most of proposed outsourcing ABE schemes do not provide a ciphertext correctness verification method for data owners. Thus, an outsourced ABE scheme with dynamic policy updating and real-time verification of ciphertext correctness is proposed to further protect data privacy in an untrusted cloud environment. In the scheme, the design of policy updating references outsourced encryption, which reduces the computational cost of generating update key. The design of ciphertext correctness verification algorithm refers to decryption operation and introduces verification transformation key to make ciphertext verification more efficient. According to different cloud environment models, efficient verification algorithm and strict verification algorithm are designed, which are suitable for honest but curious cloud environment and untrustworthy cloud environment respectively. The scheme is secure against chosen plaintext attack under the standard model. Performance analysis and efficiency comparison show that the computation of local encryption, policy updating and ciphertext verification are reduced, and the scheme is more lightweight, which is suitable for the application of computation-constrained devices in access control scenarios.

  • [1]
    Sahai A, Waters B. Fuzzy identity-based encryption[C]//Proc of the 24th Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2005: 457−473
    [2]
    Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine grained access control of encrypted data[C]//Proc of the 13th ACM Conf on Computer and Communications Security. New York: ACM, 2006: 89–98
    [3]
    Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[C]//Proc of the 23rd IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2008: 321–334
    [4]
    Waters B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization[C]//Proc of the 14th Int Workshop on Public Key Cryptography. Berlin: Springer, 2008: 53−70
    [5]
    Green M, Hohenberger S, Waters B. Outsourcing the decryption of ABE ciphertexts[C]//Proc of the 20th USENIX Conf on Security. Berkeley, CA: USENIX Association, 2011: 34−49
    [6]
    Li Jingwei, Jia Chunfu, Li Jin, et al. Outsourcing encryption of attribute-based encryption with MapReduce[C]//Proc of the 24th Int Conf on Information and Communications Security. Berlin: Springer, 2012: 191−201
    [7]
    Zhang Rui, Ma Hui, Lu Yao. Fine-grained access control system based on fully outsourced attribute-based encryption[J]. Journal of Systems & Software, 2017, 125: 344−353
    [8]
    赵志远,王建华,徐开勇,等. 面向云存储的支持完全外包属性基加密方案[J]. 计算机研究与发展,2019,56(2):218−228

    Zhao Zhiyuan, Wang Jianhua, Xu Kaiyong, et al. Fully outsourced attribute-based encryption with verifiability for cloud storage[J]. Journal of Computer Research and Development, 2019, 56(2): 218−228 (in Chinese)
    [9]
    Li Jing, Li Xiong, Wang Licheng, et al. Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption[J]. Soft Computing, 2018, 22(3): 707−714 doi: 10.1007/s00500-017-2482-1
    [10]
    Chen Hongjie, Liao Yongjian. Improvement of an outsourced attribute-based encryption scheme[J]. Soft Computing, 2019, 23(22): 11409−11417 doi: 10.1007/s00500-019-04088-y
    [11]
    Yang Kun, Jia Xiaohua, Ren Kui. Secure and verifiable policy update outsourcing for big data access control in the cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 26(12): 3461−3470
    [12]
    闫玺玺,何广辉,于金霞. 可验证的密文策略属性基加密安全外包方案[J]. 密码学报,2020,7(5):628−642

    Yan Xixi, He Guanghui, Yu Jinxia. Secure and verifiable outsourced ciphertext policy attribute base encryption[J]. Journal of Cryptologic Research, 2020, 7(5): 628−642 (in Chinese)
    [13]
    Fan Kai, Wang Junyong, Wang Xin, et al. A secure and verifiable outsourced access control scheme in fog-cloud computing[J]. Sensors, 2017, 17(7): 1695 doi: 10.3390/s17071695
    [14]
    Wang Hao, He Debiao, Shen Jian, et al. Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing[J]. Soft Computing, 2017, 21(24): 7325−7335 doi: 10.1007/s00500-016-2271-2
    [15]
    Premkamal P K, Pasupuleti S K, Alphonse P J A. A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud[J]. Journal of Ambient Intelligence and Humanized Computing, 2019, 10(7): 2693−2707 doi: 10.1007/s12652-018-0967-0
    [16]
    Wang Shulan, Wang Haiyan, Li Jianqiang, et al. A fast CP-ABE system for cyber-physical security and privacy in mobile healthcare network[J]. IEEE Transactions on Industry Applications, 2020, 56(4): 4467−4477
    [17]
    Li Xiong, Liu Tian, Chen Chaoyang, et al. A lightweight and verifiable access control scheme with constant size ciphertext in edge computing assisted IoT[J]. IEEE Internet of Things Journal, 2022, 9(19): 19227−19237 doi: 10.1109/JIOT.2022.3165576
    [18]
    Hahn C, Kim J. Verifiable outsourced decryption of encrypted data from heterogeneous trust networks[J]. IEEE Internet of Things Journal, 2022, 9(22): 22559−22570 doi: 10.1109/JIOT.2022.3181684
    [19]
    应作斌,马建峰,崔江涛. 支持动态策略更新的半策略隐藏属性加密方案[J]. 通信学报,2015,36(12):178−189 doi: 10.11959/j.issn.1000-436x.2015327

    Ying Zuobin, Ma Jianfeng, Cui Jiangtao. Partially policy hidden CP-ABE supporting dynamic policy updating[J]. Journal on Communications, 2015, 36(12): 178−189 (in Chinese) doi: 10.11959/j.issn.1000-436x.2015327
    [20]
    Ying Zuobin, Li Hui, Ma Jianfeng, et al. Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating[J]. Science China Information Sciences, 2016, 59(4): 1−16
    [21]
    Sethi K, Pradhan A, Bera P. Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation[J]. Journal of Information Security and Applications, 2020, 51: 102435 doi: 10.1016/j.jisa.2019.102435
    [22]
    Li Jianqiang, Wang Shulan, Li Yuan, et al. An efficient attribute-based encryption scheme with policy update and file update in cloud computing[J]. IEEE Transactions on Industrial Informatics, 2019, 15(12): 6500−6509 doi: 10.1109/TII.2019.2931156
    [23]
    闫玺玺,刘媛,李子臣,等. 支持策略动态更新的多机构属性基加密方案[J]. 通信学报,2017,38(10):94−101 doi: 10.11959/j.issn.1000-436x.2017201

    Yan Xixi, Liu Yuan, Li Zichen, et al. Multi-authority attribute-based encryption scheme with policy dynamic updating[J]. Journal on Communications, 2017, 38(10): 94−101(in Chinese) doi: 10.11959/j.issn.1000-436x.2017201
  • Cited by

    Periodical cited type(5)

    1. 汤梦晨,吴国文,张红,沈士根,曹奇英. 基于微分博弈的异质无线传感器网络恶意程序传播研究与分析. 计算机应用与软件. 2024(07): 100-105 .
    2. 蔡翔,丁全,汪玉. 基于博弈论的网络安全实战攻防策略研究. 微型电脑应用. 2024(10): 164-168 .
    3. 韩峰. 基于云计算的数据驱动网络安全防御技术. 数据通信. 2022(02): 37-40 .
    4. 魏学勇. 基于Markov模型的智慧校园网络安全攻防策略. 电子设计工程. 2021(15): 72-76 .
    5. 徐茂淑. 计算机网络防御策略求精关键技术分析. 信息与电脑(理论版). 2020(20): 203-205 .

    Other cited types(6)

Catalog

    Article views (87) PDF downloads (59) Cited by(11)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return