登录    注册    忘记密码    使用帮助

详细信息

Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption  ( SCI-EXPANDED收录 EI收录)   被引量:72

文献类型:期刊文献

英文题名:Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption

作者:Mao, Xianping[1];Lai, Junzuo[2];Mei, Qixiang[3];Chen, Kefei[4];Weng, Jian[2]

机构:[1]Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China;[2]Jinan Univ, Dept Comp Sci, Guangzhou 510632, Guangdong, Peoples R China;[3]Guangdong Ocean Univ, Coll Informat, Zhanjiang 524088, Peoples R China;[4]Hangzhou Normal Univ, Sch Sci, Hangzhou 310036, Zhejiang, Peoples R China

年份:2016

卷号:13

期号:5

起止页码:533

外文期刊名:IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING

收录:SCI-EXPANDED(收录号:WOS:000384015100003)、、EI(收录号:20163702792524)、Scopus(收录号:2-s2.0-84985919305)、WOS

基金:This work is supported by the National Natural Science Foundation of China (61133014, 61272413, 61272534, 61300226 and 61472165), the Guangdong Provincial Natural Science Foundation (S2013040014826), the Program for New Century Excellent Talents in University (NCET-12-0680), the Project of Science and Technology New Star of Guangzhou Pearl Rivel, the Fok Ying Tung Education Foundation (131066), and the Research Fund for the Doctoral Program of Higher Education of China (20134401110011, 20134401120017). J. Lai. and K. Chen are corresponding authors.

语种:英文

外文关键词:Attribute-based encryption; outsourced decryption; verifiability; RCCA

外文摘要:Attribute-based encryption (ABE) provides a mechanism for complex access control over encrypted data. However in most ABE systems, the ciphertext size and the decryption overhead, which grow with the complexity of the access policy, are becoming critical barriers in applications running on resource-limited devices. Outsourcing decryption of ABE ciphertexts to a powerful third party is a reasonable manner to solve this problem. Since the third party is usually believed to be untrusted, the security requirements of ABE with outsourced decryption should include privacy and verifiability. Namely, any adversary including the third party should learn nothing about the encrypted message, and the correctness of the outsourced decryption is supposed to be verified efficiently. We propose generic constructions of CPA-secure and RCCA-secure ABE systems with verifiable outsourced decryption from CPA-secure ABE with outsourced decryption, respectively. We also instantiate our CPA-secure construction in the standard model and then show an implementation of this instantiation. The experimental results show that, compared with the existing scheme, our CPA-secure construction has more compact ciphertext and less computational costs. Moreover, the techniques involved in the RCCA-secure construction can be applied in generally constructing CCA-secure ABE, which we believe to be of independent interest.

参考文献:

正在载入数据...

版权所有©广东海洋大学 重庆维普资讯有限公司 渝B2-20050021-8 
渝公网安备 50019002500408号 违法和不良信息举报中心