Abstract

Attribute-based encryption is an efficient and flexible fine-grained access control scheme. However, how to realize the attribute privacy concerns in the access policy and optimize the heavy computing overhead have been not adequately addressed. First, in view of the open-access policies formulated by data owners in the cloud environment and the linear growth of bilinear pairing operations with the number of attributes in the decryption process, a verifiable outsourced attribute-based encryption with partial policy hidden scheme is proposed, in which the attribute name of access policy can be sent while attribute value involving sensitive information can be hidden, so nobody can infer information from the access policy. Second, the bilinear pairing operation and modular power operation are outsourced to the cloud server, then users only need to perform constant exponential operation to decrypt. In addition, the proposed scheme is based on the composite order bilinear group and satisfies full secure under the standard model. Finally, compared with other schemes in term of function and performance, it shows that this scheme is more efficient and suitable for resource-constrained mobile devices in outsourcing environment.

Highlights

  • With the rapid development of cloud computing, it is increasingly favored by all fields of the Internet because of its powerful computing resources and storage performance, lead to a new computing pattern: outsourcing computing.[1]

  • Sahai and Waters[12] proposed a new public key cryptosystem, attribute-based encryption (ABE), which can be divided into two categories according to the location of the access policy: KPABE13 and CP-ABE,[14] the policy in the KP-ABE scheme is embedded in the key and the policy in the CP-ABE scheme is contained in the ciphertext

  • In order to solve the problem of privacy protection and heavy computing overhead in the cloud outsourcing environment, this article proposes a partial policyhiding ABE scheme that can verify the result of outsourcing decryption

Read more

Summary

Introduction

With the rapid development of cloud computing, it is increasingly favored by all fields of the Internet because of its powerful computing resources and storage performance, lead to a new computing pattern: outsourcing computing.[1]. Because DO encrypts data under access policy, ciphertexts can be decrypted by anyone with a set of attributes that satisfies the access policy. In attribute-based encryption (ABE) schemes, access policy is embedded in ciphertext implicitly and outsourced to cloud service provider (CSP) together with the ciphertext in a cloud environment. The scheme has less decryption cost, but the public parameters, ciphertext, and attribute information related to the policy are obtained by arbitrary malicious users. To solve communication delay in remote cloud service centers, Xiong et al.[9] introduced an attribute-based broadcast encryption scheme with partial policy hidden, user revocation, and outsourced decryption in the edge computing environment. In addition to implement partial policy hidden, the proposed scheme transfers the decryption load from user’s local device to the cloud. From the comparison and experiment, it shows that our scheme is more effective in terms of function, communication cost, and computing cost than the previously established schemes.[3,5,7]

Related work
Bilinear
Initialization
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call