Citation: | Su Zelin, Zhang Wenfang, Wang Xiaomin. Outsourced Attribute-Based Encryption Scheme with Policy Updating and Verifiable Ciphertext[J]. Journal of Computer Research and Development, 2024, 61(12): 3088-3097. DOI: 10.7544/issn1000-1239.202220133 |
Attribute-based encryption is a new access control scheme based on cryptography, which is suitable for data sharing. However, the large computational and communication costs of encryption and access policy updating limit the practical application of attribute-based encryption. Moreover, most of proposed outsourcing ABE schemes do not provide a ciphertext correctness verification method for data owners. Thus, an outsourced ABE scheme with dynamic policy updating and real-time verification of ciphertext correctness is proposed to further protect data privacy in an untrusted cloud environment. In the scheme, the design of policy updating references outsourced encryption, which reduces the computational cost of generating update key. The design of ciphertext correctness verification algorithm refers to decryption operation and introduces verification transformation key to make ciphertext verification more efficient. According to different cloud environment models, efficient verification algorithm and strict verification algorithm are designed, which are suitable for honest but curious cloud environment and untrustworthy cloud environment respectively. The scheme is secure against chosen plaintext attack under the standard model. Performance analysis and efficiency comparison show that the computation of local encryption, policy updating and ciphertext verification are reduced, and the scheme is more lightweight, which is suitable for the application of computation-constrained devices in access control scenarios.
[1] |
Sahai A, Waters B. Fuzzy identity-based encryption[C]//Proc of the 24th Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2005: 457−473
|
[2] |
Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine grained access control of encrypted data[C]//Proc of the 13th ACM Conf on Computer and Communications Security. New York: ACM, 2006: 89–98
|
[3] |
Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[C]//Proc of the 23rd IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2008: 321–334
|
[4] |
Waters B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization[C]//Proc of the 14th Int Workshop on Public Key Cryptography. Berlin: Springer, 2008: 53−70
|
[5] |
Green M, Hohenberger S, Waters B. Outsourcing the decryption of ABE ciphertexts[C]//Proc of the 20th USENIX Conf on Security. Berkeley, CA: USENIX Association, 2011: 34−49
|
[6] |
Li Jingwei, Jia Chunfu, Li Jin, et al. Outsourcing encryption of attribute-based encryption with MapReduce[C]//Proc of the 24th Int Conf on Information and Communications Security. Berlin: Springer, 2012: 191−201
|
[7] |
Zhang Rui, Ma Hui, Lu Yao. Fine-grained access control system based on fully outsourced attribute-based encryption[J]. Journal of Systems & Software, 2017, 125: 344−353
|
[8] |
赵志远,王建华,徐开勇,等. 面向云存储的支持完全外包属性基加密方案[J]. 计算机研究与发展,2019,56(2):218−228
Zhao Zhiyuan, Wang Jianhua, Xu Kaiyong, et al. Fully outsourced attribute-based encryption with verifiability for cloud storage[J]. Journal of Computer Research and Development, 2019, 56(2): 218−228 (in Chinese)
|
[9] |
Li Jing, Li Xiong, Wang Licheng, et al. Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption[J]. Soft Computing, 2018, 22(3): 707−714 doi: 10.1007/s00500-017-2482-1
|
[10] |
Chen Hongjie, Liao Yongjian. Improvement of an outsourced attribute-based encryption scheme[J]. Soft Computing, 2019, 23(22): 11409−11417 doi: 10.1007/s00500-019-04088-y
|
[11] |
Yang Kun, Jia Xiaohua, Ren Kui. Secure and verifiable policy update outsourcing for big data access control in the cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 26(12): 3461−3470
|
[12] |
闫玺玺,何广辉,于金霞. 可验证的密文策略属性基加密安全外包方案[J]. 密码学报,2020,7(5):628−642
Yan Xixi, He Guanghui, Yu Jinxia. Secure and verifiable outsourced ciphertext policy attribute base encryption[J]. Journal of Cryptologic Research, 2020, 7(5): 628−642 (in Chinese)
|
[13] |
Fan Kai, Wang Junyong, Wang Xin, et al. A secure and verifiable outsourced access control scheme in fog-cloud computing[J]. Sensors, 2017, 17(7): 1695 doi: 10.3390/s17071695
|
[14] |
Wang Hao, He Debiao, Shen Jian, et al. Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing[J]. Soft Computing, 2017, 21(24): 7325−7335 doi: 10.1007/s00500-016-2271-2
|
[15] |
Premkamal P K, Pasupuleti S K, Alphonse P J A. A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud[J]. Journal of Ambient Intelligence and Humanized Computing, 2019, 10(7): 2693−2707 doi: 10.1007/s12652-018-0967-0
|
[16] |
Wang Shulan, Wang Haiyan, Li Jianqiang, et al. A fast CP-ABE system for cyber-physical security and privacy in mobile healthcare network[J]. IEEE Transactions on Industry Applications, 2020, 56(4): 4467−4477
|
[17] |
Li Xiong, Liu Tian, Chen Chaoyang, et al. A lightweight and verifiable access control scheme with constant size ciphertext in edge computing assisted IoT[J]. IEEE Internet of Things Journal, 2022, 9(19): 19227−19237 doi: 10.1109/JIOT.2022.3165576
|
[18] |
Hahn C, Kim J. Verifiable outsourced decryption of encrypted data from heterogeneous trust networks[J]. IEEE Internet of Things Journal, 2022, 9(22): 22559−22570 doi: 10.1109/JIOT.2022.3181684
|
[19] |
应作斌,马建峰,崔江涛. 支持动态策略更新的半策略隐藏属性加密方案[J]. 通信学报,2015,36(12):178−189 doi: 10.11959/j.issn.1000-436x.2015327
Ying Zuobin, Ma Jianfeng, Cui Jiangtao. Partially policy hidden CP-ABE supporting dynamic policy updating[J]. Journal on Communications, 2015, 36(12): 178−189 (in Chinese) doi: 10.11959/j.issn.1000-436x.2015327
|
[20] |
Ying Zuobin, Li Hui, Ma Jianfeng, et al. Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating[J]. Science China Information Sciences, 2016, 59(4): 1−16
|
[21] |
Sethi K, Pradhan A, Bera P. Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation[J]. Journal of Information Security and Applications, 2020, 51: 102435 doi: 10.1016/j.jisa.2019.102435
|
[22] |
Li Jianqiang, Wang Shulan, Li Yuan, et al. An efficient attribute-based encryption scheme with policy update and file update in cloud computing[J]. IEEE Transactions on Industrial Informatics, 2019, 15(12): 6500−6509 doi: 10.1109/TII.2019.2931156
|
[23] |
闫玺玺,刘媛,李子臣,等. 支持策略动态更新的多机构属性基加密方案[J]. 通信学报,2017,38(10):94−101 doi: 10.11959/j.issn.1000-436x.2017201
Yan Xixi, Liu Yuan, Li Zichen, et al. Multi-authority attribute-based encryption scheme with policy dynamic updating[J]. Journal on Communications, 2017, 38(10): 94−101(in Chinese) doi: 10.11959/j.issn.1000-436x.2017201
|