Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 3596205, 11 pages
https://doi.org/10.1155/2017/3596205
Research Article

Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length

1College of Computer and Information, Hohai University, Nanjing 211000, China
2School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350117, China
3School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China

Correspondence should be addressed to Jiguo Li; moc.361@8861gjl

Received 28 June 2016; Accepted 1 September 2016; Published 10 January 2017

Academic Editor: Ángel Martín Del Rey

Copyright © 2017 Jiguo Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” in Proceedings of the 21st Annual International Cryptology Conference (CRYPTO '01), Santa Barbara, Calif, USA, August 2001, vol. 2139 of Lecture Notes in Computer Science, pp. 213–229, Springer, Berlin, Germany, 2001. View at Publisher · View at Google Scholar
  2. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06), pp. 89–98, ACM, November 2006. View at Publisher · View at Google Scholar · View at Scopus
  3. J. Li, C. Jia, J. Li, and X. Chen, “Outsourcing encryption of attribute-based encryption with MapReduce,” in Information and Communications Security, T. W. Chim and T. H. Yuen, Eds., vol. 7618 of Lecture Notes in Computer Science, pp. 191–201, Springer, Berlin, Germany, 2012. View at Publisher · View at Google Scholar
  4. A. Lewko and B. Waters, “Unbounded HIBE and attribute-based encryption,” in Proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT '11), Tallinn, Estonia, May 2011, vol. 6632 of Lecture Notes in Computer Science, pp. 547–567, Springer, Berlin, Germany, 2011. View at Publisher · View at Google Scholar
  5. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proceedings of the IEEE Symposium on Security and Privacy (SP '07), pp. 321–334, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  6. B. D. Qin, R. H. Deng, S. L. Liu, and S. Q. Ma, “Attribute-based encryption with efficient verifiable outsourced decryption,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 7, pp. 1384–1393, 2015. View at Publisher · View at Google Scholar · View at Scopus
  7. H. Deng, Q. Wu, B. Qin et al., “Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts,” Information Sciences, vol. 275, pp. 370–384, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  8. R. Ostrovsky, A. Sahai, and B. Waters, “Attribute-based encryption with non-monotonic access structures,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 195–203, ACM, Alexandria, Va, USA, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. T. Okamoto and K. Takashima, “Fully secure functional encryption with general relations from the decisional linear assumption,” in Advances in Cryptology—CRYPTO 2010, T. Rabin, Ed., vol. 6223 of Lecture Notes in Computer Science, pp. 191–208, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar
  10. L. Cheung and C. Newport, “Provably secure ciphertext policy ABE,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 456–465, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  11. J. Li, X. Chen, J. Li, C. Jia, J. Ma, and W. Lou, “Fine-grained access control system based on outsourced attribute-based encryption,” in Computer Security—ESORICS 2013, J. Crampton, S. Jajodia, and K. Mayes, Eds., vol. 8134 of Lecture Notes in Computer Science, pp. 592–609, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar
  12. M. Green, S. Hohenberger, and B. Waters, “Outsourcing the decryption of ABE ciphertexts,” in Proceedings of the 20th USENIX Conference on Security (SEC '11), p. 34, 2011.
  13. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” ACM Transactions on Information and System Security, vol. 9, no. 1, pp. 1–30, 2006. View at Publisher · View at Google Scholar · View at Scopus
  14. M. Blaze, G. Bleumer, and M. Strauss, “Divertible protocols and atomic proxy cryptography,” in Advances in Cryptology—EUROCRYPT'98, K. Nyberg, Ed., vol. 1403 of Lecture Notes in Computer Science, pp. 127–144, Springer, Berlin, Germany, 1998. View at Publisher · View at Google Scholar
  15. M. Chase, “Multi-authority attribute based encryption,” in Proceedings of the 4th Theory of Cryptography Conference (TCC '07), Amsterdam, The Netherlands, February 2007, Lecture Notes in Computer Science, pp. 515–534, Springer, Berlin, Germany, 2007. View at Google Scholar
  16. Z. Liu, Z. Cao, Q. Huang, D. S. Wong, and T. H. Yuen, “Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles,” in Computer Security—ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12–14,2011. Proceedings, vol. 6879 of Lecture Notes in Computer Science, pp. 278–297, Springer, Berlin, Germany, 2011. View at Publisher · View at Google Scholar
  17. J. G. Han, W. Susilo, Y. Mu, and J. Yan, “Privacy-preserving decentralized key-policy attribute-based encryption,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 11, pp. 2150–2162, 2012. View at Publisher · View at Google Scholar · View at Scopus
  18. H. L. Qian, J. G. Li, and Y. C. Zhang, “Privacy-preserving decentralized ciphertext-policy attribute-based encryption with fully hidden access structure,” in Proceedings of the 15th International Conference on Information and Communications Security (ICICS '13), vol. 8233 of Lecture Notes in Computer Science LNCS, pp. 363–372, Springer, Berlin, Germany, 2013.
  19. H. L. Qian, J. G. Li, Y. C. Zhang, and J. G. Han, “Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation,” International Journal of Information Security, vol. 14, no. 6, pp. 487–497, 2015. View at Publisher · View at Google Scholar · View at Scopus
  20. Z. Liu, Z. F. Cao, and D. S. Wong, “Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on eBay,” in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS '13), pp. 475–486, Berlin, Germany, November 2013. View at Publisher · View at Google Scholar · View at Scopus
  21. Z. Liu, Z. F. Cao, and D. S. Wong, “White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 1, pp. 76–88, 2013. View at Publisher · View at Google Scholar · View at Scopus
  22. J. T. Ning, Z. F. Cao, X. L. Dong, L. F. Wei, and X. D. Lin, “Large universe ciphertext-policy attribute-based encryption with white-box traceability,” in Computer Security—ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7–11, 2014. Proceedings, Part II, vol. 8713 of Lecture Notes in Computer Science, pp. 55–72, Springer, Berlin, Germany, 2014. View at Publisher · View at Google Scholar
  23. J. G. Li, W. Yao, Y. C. Zhang, H. L. Qian, and J. G. Han, “Flexible and fine-grained attribute-based data storage in cloud computing,” IEEE Transactions on Services Computing, 2016. View at Publisher · View at Google Scholar
  24. J. G. Li, X. N. Lin, Y. C. Zhang, and J. G. Han, “KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage,” IEEE Transactions on Services Computing, 2016. View at Publisher · View at Google Scholar
  25. J. G. Li, Y. R. Shi, and Y. C. Zhang, “Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage,” International Journal of Communication Systems, 2015. View at Publisher · View at Google Scholar
  26. Z. J. Fu, X. M. Sun, Q. Liu, L. Zhou, and J. G. Shu, “Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing,” IEICE Transactions on Communications, vol. 98, no. 1, pp. 190–200, 2015. View at Publisher · View at Google Scholar · View at Scopus
  27. Z. H. Xia, X. H. Wang, X. M. Sun, and Q. Wang, “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp. 340–352, 2015. View at Google Scholar
  28. Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, “Enabling personalized search over encrypted outsourced data with efficiency improvement,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 9, pp. 2546–2559, 2016. View at Publisher · View at Google Scholar
  29. J. G. Li, H. P. Wang, Y. C. Zhang, and J. Shen, “Ciphertext-policy attribute-based encryption with hidden access policy and testing,” KSII Transactions on Internet and Information Systems, vol. 10, no. 8, pp. 3339–3352, 2016. View at Publisher · View at Google Scholar
  30. Y.-J. Ren, J. Shen, J. Wang, J. Han, and S.-Y. Lee, “Mutual verifiable provable data auditing in public cloud storage,” Journal of Internet Technology, vol. 16, no. 2, pp. 317–323, 2015. View at Publisher · View at Google Scholar · View at Scopus
  31. J.-Z. Lai, R. H. Deng, C. Guan, and J. Weng, “Attribute-based encryption with verifiable outsourced decryption,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 8, pp. 1343–1354, 2013. View at Publisher · View at Google Scholar · View at Scopus
  32. J. Li, X. Y. Huang, J. W. Li, X. F. Chen, and Y. Xiang, “Securely outsourcing attribute-based encryption with checkability,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 8, pp. 2201–2210, 2014. View at Publisher · View at Google Scholar · View at Scopus
  33. K. Emura, A. Miyaji, A. Nomura, K. Omote, and M. Soshi, “A Ciphertext-policy attribute-based encryption scheme with constant ciphertext length,” in Information Security Practice and Experience: 5th International Conference, ISPEC 2009 Xi'an, China, April 13–15, 2009 Proceedings, vol. 5451 of Lecture Notes in Computer Science, pp. 13–23, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar
  34. J. Herranz, F. Laguillaumie, and C. Rafols, “Constant size ciphertexts in threshold attribute-based encryption,” in Proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography (PKC '10), Paris, France, May 2010, vol. 6056 of Lecture Notes in Computer Science, pp. 19–34, Springer, Berlin, Germany, 2010. View at Google Scholar
  35. R. Canetti, H. Krawczyk, and J. B. Nielsen, “Relaxing chosen-ciphertext security,” in Proceedings of the 23rd Annual International Cryptology Conference (CRYPTO '03), Santa Barbara, Calif, USA, August 2003, vol. 2729 of Lecture Notes in Computer Science, pp. 565–582, Springer, Berlin, Germany, 2003. View at Google Scholar
  36. A. D. Caro, “Java pairing-based cryptography library,” 2012, http://libeccio.dia.unisa.it/projects/jpbc/.
  37. B. Lynn, PBC (Pairing-Based Cryptography) Library, 2012, http://crypto.stanford.edu/pbc/.